From 9ad7a23a36db1c06d8e3bf42df9e54376cad003e Mon Sep 17 00:00:00 2001 From: Fazle Arefin Date: Mon, 31 Mar 2025 11:26:34 +1100 Subject: [PATCH] patator: add examples (#16072) --- pages/common/patator.md | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/pages/common/patator.md b/pages/common/patator.md index f5dd5c0ac8..720c4c2475 100644 --- a/pages/common/patator.md +++ b/pages/common/patator.md @@ -5,12 +5,20 @@ - Brute force ssh login with rate limit and timeout options (successful login will show login banner or something similar): -`patator ssh_login host={{ip_or_host}} user=FILE0 0={{path/to/users.txt}} password=FILE1 1={{path/to/passwords.txt}} --rate_limit={{seconds}} --timeout={{seconds}}` +`patator ssh_login host={{ip_or_host}} user=FILE0 password=FILE1 0={{path/to/users.txt}} 1={{path/to/passwords.txt}} --rate_limit={{seconds}} --timeout={{seconds}} -x ignore:mesg='Authentication failed.'` - Brute force encrypted zip file: `patator unzip_pass zipfile={{path/to/file.zip}} password=FILE0 0={{path/to/passwords.txt}} -x ignore:code!=0` +- Brute force http basic auth (payload file `userpass.txt` should be in the format `username:password`): + +`patator http_fuzz url={{http://host:port}} auth_type=basic user_pass=COMBO00:COMBO01 0={{path/to/userpass.txt}} -x ignore:code=401` + +- Brute force FTP/FTPS login: + +`patator ftp_login host={{ip_or_host}} user=FILE0 password=FILE1 0={{path/to/users.txt}} 1={{path/to/passwords.txt}} tls={{0|1}} -x ignore:mesg='Login incorrect.' -x ignore,reset,retry:code=500` + - List all available modules: `patator --help`