Crowbar
Crowbar is a brute forcing tool for penetration tests that supports OpenVPN, RDP with NLA, SSH private key authentication, and VNC key authentication. It differs from typical brute forcers by using SSH keys instead of username/password pairs for SSH.
Description
Crowbar, formerly known as Levye, is designed for brute forcing specific protocols during penetration testing. Unlike standard tools that rely on username and password combinations for SSH, Crowbar leverages SSH private keys obtained in tests to target other SSH servers. This approach enables testers to utilize compromised keys effectively.
The tool targets services like OpenVPN, Remote Desktop Protocol (RDP) including NLA support, SSH private key authentication, and VNC key authentication. It supports both single static targets and multiple targets from a file, with options for usernames and wordlists.
Crowbar is particularly useful in scenarios where private keys or specific credentials are available, allowing for more targeted brute force attacks in penetration testing environments.
How It Works
Crowbar performs brute force attacks on specified protocols: OpenVPN (-b openvpn), RDP with NLA support (-b rdp), SSH private key authentication (-b sshkey), and VNC key authentication (-b vnckey). For RDP, it iterates through usernames and passwords from wordlists against target hosts. For SSH, it uses provided private keys instead of password guessing. It supports single hosts or lists from files, with threading for efficiency, and logs successes like RDP-SUCCESS with credentials.
Installation
sudo apt install crowbarFlags
Examples
crowbar -b rdp -s 192.168.86.61/32 -u victim -C /root/words.txt -n 1crowbar -b rdp -s 192.168.86.61/32 -u victim -C /root/words.txtcrowbar -b sshkey -s target_host -k /path/to/private_keycrowbar -b openvpn -s vpn_server -u user -C passwords.txtcrowbar -b vnckey -s 192.168.1.100/32 -k vnc_keys.txtcrowbar -b rdp -S targets.txt -C /root/words.txtcrowbar -h