OtherPassword CrackingPenetration Testing

How to use inguma in Kali Linux For Password Cracking

How to use inguma in Kali Linux For Password Cracking

What Inguma is ?

Inguma is a penetration testing toolkit entirely written in python. The framework includes modules to discover hosts, gather information about, fuzz targets, brute force user names and passwords and, of course, exploits.

While the current exploitation capabilities in Inguma may be limited, this program provides numerous tools for information gathering and target auditing.  (Definition from Kali site)

How To Use It?

1)First you need to locate Inguma. Its in menu exploitation Tools Contain Inguma. Seen in Below Figure:-


Locate Inguma (Explotation Tools)
Locate Inguma(Explotation Tools)

2) Then you type autoscan then it will ask you for target ip Below you can see:-

autoscan and target ip
autoscan and target ip

3)Now you need to get target ip my target ip is you Can see it in shot below:-

target ip
target ip

4) Now just type your target ip , Then it will ask Brute force username and password  Type “Y
then again it will ask for automatically fuzz available target Type “Y” again now
it will ask for print file name or where you want to save file i give /root/hacked you can
change as you desired and press enter All process show below.


5)After giving all information it start scanning ports from our target. and start gathering net bios from target.

scan port
scan port

After that you will get password and user name in mentioned file.
Example of using

[email protected]:~# inguma

WARNING: No route found for IPv6 destination :: (no default route?)
Inguma v0.4
Copyright (c) 2006-2008 Joxean Koret <[email protected]>
Copyright (c) 2009-2011 Hugo Teso <[email protected]>

No module named cx_Oracle

Type ‘help’ for a short usage guide.
inguma> autoscan
Target host or network:
Brute force username and passwords (y/n)[n]:
Automagically fuzz available targets (y/n)[n]:
Print to filename (enter for stdout):
Inguma ‘autoscan’ report started at Wed May 14 12:00:56 2014

Port scanning target

Related Articles

Back to top button