Bruteforcing SSH with Medusa tutorial

Assuming you have Medusa installed (it comes preinstalled with Backtrack and other security distros)
and you have a dictionary file use the following syntax:

Code:
medusa -h <host> -u <target-account> -P <password-file> -M ssh -e n -O output

Then simply open ‘output’ and look to to see if it managed.

-e n

means medusa will also try to login without a password.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s