Forrest logo
back to the medusa tool

medusa:tldr:da5cd

medusa: Execute a brute force against a list of SMB servers using a username and a pwdump file.
$ medusa -M smbnt -H ${path-to-hosts_file} -C ${path-to-pwdump_file} -u ${username} -m PASS:HASH
try on your machine

This command is executing the Medusa tool to perform a password cracking attack on SMB (Server Message Block) network services. Here is a breakdown of each argument:

  • medusa is the command to run the Medusa tool.
  • -M smbnt specifies the module to use for the attack, in this case, it is smbnt for SMB network services.
  • -H ${path-to-hosts_file} identifies the path to a file containing a list of target hosts or IP addresses. The ${path-to-hosts_file} needs to be replaced with the actual path to the file.
  • -C ${path-to-pwdump_file} specifies the path to the file containing password hashes (specifically pwdump format). The ${path-to-pwdump_file} needs to be replaced with the actual path to the file.
  • -u ${username} defines the username to use in the password cracking attempts. The ${username} needs to be replaced with the actual username.
  • -m PASS:HASH indicates the method for the password cracking attack. PASS represents the plaintext password, and HASH represents the password hash. Medusa will try to crack the password by comparing it to the provided hash.

In summary, this command runs Medusa with the smbnt module, targeting a list of hosts, provided password hashes, and a specific username. It attempts to crack the password by comparing a plaintext password with the given hash.

This explanation was created by an AI. In most cases those are correct. But please always be careful and never run a command you are not sure if it is safe.
back to the medusa tool