gtaturismoboss
Altcoin Explorer
2
MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1
300 XP

Hey Folks, in this tutorial we are going to talk about another new brute forcing tool named “Patator“. Patator was written out of frustration from using Hydra, Medusa, Ncrack, Metasploit modules and Nmap NSE scripts for password guessing attacks. I opted for a different approach in order to not create yet another brute-forcing tool and avoid repeating the same shortcomings.
Let’s take a look

Modules (Help)
It comes pre-installed in kali linux operating system, so we can boot it by entering the name of this tool. The help command will show all the modules available in this tool.
patator --help1patator--help

Check Usage of Particular Module
We have configured the FTP service running on port 21 on our virtual machine, so we will take the FTP module itself and try to get a valid username and password to login to the service by using a brute force attack. We can check the complete usage of any module by following the command.
Usage

patator ftp_login1patator ftp_login

Guessing Username and Password
It will depend on you whether your dictionary is able to crack the password or not. But anyway similarly you can perform brute force attack on any service or website login. Below we have dropped a complete usage guide that you should consider.
Usage

patator ftp_login host=192.168.1.9 user=FILE0 password=FILE1 0=/root/username.txt 1=/root/password.txt1patator ftp_login host=192.168.1.9user=FILE0 password=FILE10=/root/username.txt1=/root/password.txt

Filters
Similarly if you do not want to print wrong combinations then you can take help of the below command.
Usage

patator ftp_login host=192.168.1.9 user=FILE0 password=FILE1 0=/root/username.txt 1=/root/password.txt -x ignore:mesg='Login incorrect.'1patator ftp_login host=192.168.1.9user=FILE0 password=FILE10=/root/username.txt1=/root/password.txt-xignore:mesg='Login incorrect.'

Brute forcing on Specific Port
As you can see the FTP service typically runs on port 21, but administrators have changed the port number due to increased security levels.

Done

Usage

patator ftp_login host=192.168.1.9 port=2121 user=FILE0 password=FILE1 0=/root/username.txt 1=/root/password.txt -x ignore:mesg='Login incorrect.1patator ftp_login host=192.168.1.9port=2121user=FILE0 password=FILE10=/root/username.txt1=/root/password.txt-xignore:mesg='Login incorrect.
