Introduction
In this challenge, you'll be tasked with cracking a rogue employee's FTP server using Hydra and a custom wordlist. The scenario involves a weakly secured FTP server running on the company network, and your objective is to identify the password and secure the server.
The challenge involves setting up a vulnerable FTP server using vsftpd, creating a user named configuser with a known password, and then crafting a custom password list file named passwords.txt containing potential passwords like "config1", "config123", and "password". Finally, you'll use Hydra to brute-force the FTP password for the configuser account on localhost using your custom password list, aiming to identify the correct password and demonstrate the vulnerability.
Crack FTP with Custom Wordlist
A rogue employee has set up a personal FTP server on the company network with a weak password. Your mission is to use Hydra to identify the password and secure the server.
Tasks
- Create a password list file named
passwords.txtin the~/projectdirectory containing the passwords "config1", "config123", and "password". - Use Hydra to crack the FTP password for the username
configuseronlocalhostusing your custom password list.
Requirements
- The password list file must be named
passwords.txtand located in the~/projectdirectory. - The Hydra command must target the FTP service running on
localhost. - The Hydra command must specify the username
configuser. - The Hydra command must use the password list file you created.
- The password list file must contain the passwords "config1", "config123", and "password", each on a new line.
- Save the results to a file
results.txtin the~/projectdirectory.
Examples
If Hydra successfully cracks the password, you will see output similar to:
cat ~/project/results.txt
Should display the following output:
[21][ftp] host: localhost login: configuser password: [placeholder]

Hints
- Use the
echo -ecommand or manual editing to create the password list file. - Refer to the lab documentation for the correct Hydra syntax.
Summary
In this challenge, the goal is to crack an FTP password using Hydra with a custom wordlist. The setup involves installing and configuring vsftpd and hydra, creating a test user (configuser) with a known weak password, and starting the FTP service.
The task requires creating a passwords.txt file containing potential passwords, then using Hydra to brute-force the FTP password for the configuser account on localhost, specifying the custom password list. This exercise demonstrates how to use Hydra to identify weak passwords in FTP services and highlights the importance of strong password policies.


