
This lesson requires Loopus Pro access. Upgrade to unlock all courses, labs, and challenges.
When SSH allows password authentication, brute force attacks can yield credentials. This lesson covers effective techniques while managing the risk of detection and account lockouts.
Effective wordlists improve success rates. Common locations include rockyou.txt and SecLists password collections. Custom lists generated with CeWL from target websites and rule-based expansion with hashcat improve chances.
Identify valid usernames first. Common SSH usernames include root, admin, administrator, user, test, company names, and employee names from OSINT/LDAP.
Slow down attacks to evade lockouts using wait time between attempts and limiting concurrent tasks. Fast attacks with 10+ attempts per second get detected. Moderate at 1 attempt per second provides some evasion. Slow at 1 attempt per minute is hard to detect.
Try common passwords across many users. Spray one password against many users before moving to the next password. Add delays between passwords to avoid lockouts.
Success leaves you with credentials for initial access or privilege escalation.
What tool forces parallel logins?
What prevents brute force?
What auth method prevents brute force?
What tool tests multiple users?
Found the flag? Submit it below to complete this lesson.
Format: LOOPUS{...}