Detecting Bruteforcing with Artifacts
Detection of Indicators and Telemetry
Offline cracking does not hit login services, so lockouts and failed logon dashboards stay quiet. We can detect the work where it runs, on endpoints and jump boxes. The important signals to monitor include:
Process creation: Password cracking has a small set of well-known binaries and command patterns that we can look out for. A mix of process events, file activity, GPU signals, and network touches tied to tooling and wordlists. Our goal is to make the activity obvious without drowning in noise.
Binaries and aliases:
john,hashcat,fcrackzip,pdfcrack,zip2john,pdf2john.pl,7z,qpdf,unzip,7za,perlinvokingpdf2john.pl.Command‑line traits:
--wordlist,-w,--rules,--mask,-a 3,-min Hashcat, references torockyou.txt,SecLists,zip2john,pdf2john.Potfiles and state:
~/.john/john.pot,.hashcat/hashcat.potfile,john.rec.
GPU and Resource Artefacts
GPU cracking is loud. Sudden high utilisation on hosts can be picked up and would need to be investigated.
nvidia-smishows long‑running processes namedhashcatorjohn.High, steady GPU utilisation and power draw while the fan curve spikes.
Libraries loaded:
nvcuda.dll,OpenCL.dll,libcuda.so,amdocl64.dll.
Network Hints, Light but Useful
Offline cracking does not need the network once wordlists are present. Yet most operators fetch lists and tools first.
Downloads of large text files named
rockyou.txt, or Git clones of popular wordlist repos.Package installs, for example
apt install john hashcat, detected by EDR package telemetry.Tool updates and driver fetches for GPU runtimes.
Unusual File Reads
Repeated reads of files such as wordlists or encrypted files would need analysis.
Detections
Below are some examples of detection rules and hunting queries we can put to use across various environments.
Sysmon:
Linux audit rules, temporary for an investigation:
Sigma style rule, Windows process create for cracking tools:
Last updated