Steps-to-bruteforcing-remote-Crypto-miner

Only take three steps(on Kali System) :)

If you don't have the Kali system as a virtual machine on your PC. You will need to download and install one. The most proficient way for me is to install Kali on VMware Fusion since it's free for a preview version.

1.Sign up and sign in shodan.io https://www.shodan.io and type antminer port:80 into the search bar.

You will see something like this: m1.jpg

You may want to add more filters to the query such as country:US or city:Paris

2.Download customized wordlist as a dictionary for later brute-forcing attack from the link, famously known as RockYou2021(appro 90GB large, so prepare enough spaces beforehand). The link is here: https://github.com/ohmybahgosh/RockYou2021.txt

If you don't have enough spaces on your disks, you may want to download the resources below as a mini-version or do brute-forcing later on

3.Select remote antminer with title of 401 unauthorized(most of them are by default). Since those miners mostly use "root" as their username, we can then use hydra(assuming that you have installed the tool on your Kali system) with one line code to implement brute-forcing to the miner we just chose.

For example, the code can be like this:

hydra -l root -P commonPasswords.txt -vV {TARGET} http-get /

  • First of all, you may want to replace "{TARGET}" with the IP address and the port number such as:123.123.123.123:80
  • Here, "root" is the default username of the crypto miner we chose(You may want to change it according to the miner that you choose)
  • Also, "commonPasswords.txt" is the dictionary file name, so you may want to replace it with your dictionary file name.

Then execute the command and wait for a miracle(since people are more concerned about web security nowadays).

Results: If lucky enough, you will see the page below:

m2.jpg

Then just simply edit on the site as your wish.

Otherwise, you may want to try other dictionary files for another brute-force attack or try to break it using other methods according to its vulnerabilities.

Done and done~!

Attention:

This article only shows a simple way for implementing a basic brute-forcing attack to remote servers and I will not be responsible for people who use knowledge from this article for any illegal purposes