• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer navigation

The Geek Diary

  • OS
    • Linux
    • CentOS/RHEL
    • Solaris
    • Oracle Linux
    • VCS
  • Interview Questions
  • Database
    • oracle
    • oracle 12c
    • ASM
    • mysql
    • MariaDB
  • DevOps
    • Docker
    • Shell Scripting
  • Big Data
    • Hadoop
    • Cloudera
    • Hortonworks HDP

Medusa Command Examples in Linux

by admin

“Medusa” is a security tool for performing brute-force attacks on login credentials for a variety of protocols. It is designed to be fast, efficient, and modular, allowing for the use of multiple modules for different protocols.

Medusa is commonly used by security professionals for penetration testing, identifying and exploiting weaknesses in target systems. The tool can perform brute-force attacks on a range of protocols including SSH, FTP, HTTP, and SMB, among others.

The tool supports parallel brute-forcing, allowing multiple login attempts to be made simultaneously, speeding up the process. Medusa also supports various authentication mechanisms, including password authentication, public key authentication, and Kerberos authentication.

Note: The use of Medusa is highly discouraged for malicious purposes and can result in serious legal consequences. Additionally, brute-force attacks can cause significant harm to systems and networks, making them unavailable or slowing them down. Security professionals should always obtain proper authorization before performing any security testing activities.

Medusa Command Examples

1. Execute brute force against an FTP server using a file containing usernames and a file containing passwords:

# medusa -M ftp -h host -U path/to/username_file -P path/to/password_file

2. Execute a login attempt against an HTTP server using the username, password and user-agent specified:

# medusa -M HTTP -h host -u username -p password -m USER-AGENT:"Agent"

3. Execute a brute force against a MySQL server using a file containing usernames and a hash:

# medusa -M mysql -h host -U path/to/username_file -p hash -m PASS:HASH

4. Execute a brute force against a list of SMB servers using a username and a pwdump file:

# medusa -M smbnt -H path/to/hosts_file -C path/to/pwdump_file -u username -m PASS:HASH

Filed Under: Linux

Some more articles you might also be interested in …

  1. apport-bug Command Examples in Linux
  2. cryfs: A cryptographic filesystem for the cloud
  3. logsave: command not found
  4. How to create an XFS Filesystem
  5. chcon command examples in Linux
  6. vgcreate Command Examples in Linux
  7. CentOS / RHEL 6,7 : How to delete an iSCSI Target on the initiator (iSCSI client)
  8. prlimit: command not found
  9. How to Verify the Syntax of the file /etc/ssh/sshd_config
  10. uflash: command not found

You May Also Like

Primary Sidebar

Recent Posts

  • csslint: A linter for CSS code
  • csh: The shell (command interpreter) with C-like syntax (Command Examples)
  • csc: The Microsoft C# Compiler (Command Examples)
  • crystal: Tool for managing Crystal source code

© 2023 · The Geek Diary

  • Archives
  • Contact Us
  • Copyright