The Brute Force tab provides options for brute force attacks on database credentials, hash cracking, and other security mechanisms that require systematic testing of multiple values.
The Brute Force tab contains four main sections:
Parameter: --brute-force
Description: Brute-force database login credentials
Behavior: Attempts multiple username/password combinations
Requirements: Valid database connection details
Use Cases:
Parameter: -U USERNAME
Description: Specific username to brute-force
Examples:
-U admin
-U root
-U sa
-U system
Use Cases:
Parameter: -P PASSWORD
Description: Specific password to test
Examples:
-P password123
-P admin123
-P letmein
-P qwerty
Use Cases:
Parameter: -U /path/to/users.txt
Description: Load usernames from file
Format: One username per line
Examples:
admin
root
user
test
guest
Use Cases:
Parameter: -P /path/to/passwords.txt
Description: Load passwords from file
Format: One password per line
Examples:
password
123456
admin
letmein
qwerty
welcome
Use Cases:
Parameter: --crack
Description: Crack password hashes using built-in algorithms
Behavior: Attempts to crack hashes using common algorithms
Supported Algorithms:
Use Cases:
Parameter: --dict=FILE
Description: Use custom dictionary for hash cracking
Format: One word per line
Examples:
/path/to/rockyou.txt
/path/to/custom_dict.txt
/path/to/company_words.txt
Use Cases:
Parameter: --hash-file=FILE
Description: File containing hashes to crack
Format: One hash per line, optionally with username:salt
Examples:
5f4dcc3b5aa765d61d8327deb882cf99
admin:5f4dcc3b5aa765d61d8327deb882cf99
user:abc123:5f4dcc3b5aa765d61d8327deb882cf99
Use Cases:
Parameter: --common-user
Description: Use built-in common usernames
Behavior: Tests common usernames like admin, root, user
Use Cases:
Parameter: --common-pass
Description: Use built-in common passwords
Behavior: Tests common passwords like password, 123456, admin
Use Cases:
Parameter: --user-file=FILE
Description: Custom usernames wordlist
Format: One username per line
Use Cases:
Parameter: --pass-file=FILE
Description: Custom passwords wordlist
Format: One password per line
Use Cases:
Parameter: --threads=NUM
Description: Number of threads for brute force attacks
Default: 1
Range: 1-10 (depending on system)
Examples:
--threads=4
--threads=8
--threads=16
Use Cases:
Parameter: --delay=SECONDS
Description: Delay between brute force attempts
Default: 0
Examples:
--delay=1
--delay=0.5
--delay=2
Use Cases:
Parameter: --retries=NUM
Description: Maximum retries for failed attempts
Default: 3
Examples:
--retries=1
--retries=5
--retries=10
Use Cases:
Parameter: --timeout=SECONDS
Description: Timeout for each brute force attempt
Default: 30
Examples:
--timeout=10
--timeout=60
--timeout=120
Use Cases:
Brute Force Login: โ Enabled
User File: /path/to/users.txt
Password File: /path/to/passwords.txt
Threads: 4
Delay: 1 second
Generated Command:
sqlmap -u "http://example.com/login.php" --brute-force -U /path/to/users.txt -P /path/to/passwords.txt --threads=4 --delay=1
Crack Password Hashes: โ Enabled
Dictionary File: /path/to/rockyou.txt
Hash File: /path/to/hashes.txt
Generated Command:
sqlmap -u "http://example.com/admin.php?id=1" --crack --dict=/path/to/rockyou.txt --hash-file=/path/to/hashes.txt
Common Usernames: โ Enabled
Common Passwords: โ Enabled
Threads: 2
Delay: 0.5 seconds
Generated Command:
sqlmap -u "http://example.com/auth.php" --common-user --common-pass --threads=2 --delay=0.5
User: admin
Password File: /path/to/passwords.txt
Threads: 8
Delay: 2 seconds
Retries: 5
Timeout: 60 seconds
Generated Command:
sqlmap -u "http://example.com/login.php" -U admin -P /path/to/passwords.txt --threads=8 --delay=2 --retries=5 --timeout=60
Crack Password Hashes: โ Enabled
Dictionary File: /path/to/custom_dict.txt
Threads: 4
Generated Command:
sqlmap -u "http://example.com/user.php?id=1" --crack --dict=/path/to/custom_dict.txt --threads=4
Problem: Brute force attempts failing or not connecting Solutions:
Problem: Brute force taking too long or hanging Solutions:
Problem: Brute force causing account lockouts Solutions:
Problem: Hash cracking not working or producing no results Solutions:
Problem: Brute force consuming too many resources Solutions:
Problem: Incorrect results from brute force attempts Solutions: