Medusa Command Examples in Linux

“Medusa” is a security tool for performing brute-force attacks on login credentials for a variety of protocols. It is designed to be fast, efficient, and modular, allowing for the use of multiple modules for different protocols.

Medusa is commonly used by security professionals for penetration testing, identifying and exploiting weaknesses in target systems. The tool can perform brute-force attacks on a range of protocols including SSH, FTP, HTTP, and SMB, among others.

The tool supports parallel brute-forcing, allowing multiple login attempts to be made simultaneously, speeding up the process. Medusa also supports various authentication mechanisms, including password authentication, public key authentication, and Kerberos authentication.

Note: The use of Medusa is highly discouraged for malicious purposes and can result in serious legal consequences. Additionally, brute-force attacks can cause significant harm to systems and networks, making them unavailable or slowing them down. Security professionals should always obtain proper authorization before performing any security testing activities.

Medusa Command Examples

1. Execute brute force against an FTP server using a file containing usernames and a file containing passwords:

# medusa -M ftp -h host -U path/to/username_file -P path/to/password_file

2. Execute a login attempt against an HTTP server using the username, password and user-agent specified:

# medusa -M HTTP -h host -u username -p password -m USER-AGENT:"Agent"

3. Execute a brute force against a MySQL server using a file containing usernames and a hash:

# medusa -M mysql -h host -U path/to/username_file -p hash -m PASS:HASH

4. Execute a brute force against a list of SMB servers using a username and a pwdump file:

# medusa -M smbnt -H path/to/hosts_file -C path/to/pwdump_file -u username -m PASS:HASH
Related Post