Jump to content
denjacker

Patator – Multi Purpose Brute Forcing Tool

Recommended Posts

There are many tools available for cracking like, ncrack, brutus and THE hydra but today I want to share patator. Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.

Currently it supports the following modules:

  1. * ftp_login : Brute-force FTP
  2. * ssh_login : Brute-force SSH
  3. * telnet_login : Brute-force Telnet
  4. * smtp_login : Brute-force SMTP
  5. * smtp_vrfy : Enumerate valid users using the SMTP VRFY command
  6. * smtp_rcpt : Enumerate valid users using the SMTP RCPT TO command
  7. * http_fuzz : Brute-force HTTP/HTTPS
  8. * pop_passd : Brute-force poppassd (not POP3)
  9. * ldap_login : Brute-force LDAP
  10. * smb_login : Brute-force SMB
  11. * mssql_login : Brute-force MSSQL
  12. * oracle_login : Brute-force Oracle
  13. * mysql_login : Brute-force MySQL
  14. * pgsql_login : Brute-force PostgreSQL
  15. * vnc_login : Brute-force VNC
  16. * dns_forward : Forward lookup subdomains
  17. * dns_reverse : Reverse lookup subnets
  18. * snmp_login : Brute-force SNMPv1/2 and SNMPv3
  19. * unzip_pass : Brute-force the password of encrypted ZIP files
  20. * keystore_pass : Brute-force the password of Java keystore files

The name "Patator" comes from patator - YouTube

Patator is NOT script-kiddie friendly, please read the README inside patator.py before reporting.

FTP : Enumerate valid logins on a too verbose server

HTTP : Brute-force phpMyAdmin logon

SNMPv3 : Find valid usernames

SNMPv3 : Find valid passwords

DNS : Forward lookup

DNS : Reverse lookup two netblocks owned by Google

ZIP : Crack a password-protected ZIP file (older pkzip encryption not supported in JtR)

SURSA :

http://www.ehacking.net/2011/12/patator-multi-purpose-brute-forcing.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+ehacking+%28Ehacking-+Your+Way+To+The+World+Of+IT+Security%29

Edited by denjacker
  • Upvote 1
Link to comment
Share on other sites

:)))

Adevaru e ca metrosexuali ca tine care nu stiu sa vorbeasca intalnesc pe toate drumurile.

Sa fi iubit si poate daca viitoare ai noroc mau mult in viata.

Tu stii, ai site-ul ala mai praf decat mamaie. Ai fiecare post in parte copy/paste, n-ai scris nici macar un tutorial. Pana si "link-urile" catre surse le-ai pus fara ancora, ca nu cumva sa iti strici page rank-ul sau sa dea cineva click din gresala.

Link to comment
Share on other sites

Tu stii, ai site-ul ala mai praf decat mamaie. Ai fiecare post in parte copy/paste, n-ai scris nici macar un tutorial. Pana si "link-urile" catre surse le-ai pus fara ancora, ca nu cumva sa iti strici page rank-ul sau sa dea cineva click din gresala.

Prietenul meu. Am cateva tutoriale video nu multe pentru ca nu prea am avut timp sa fac. Daca tu imi spui ca sunt copy paste poate asa o fi nu te contrazic, dar dami PM deunde am dat paste. Cu situ iti dau dreptate nu stiu prea multe despre web design si nici nu cred ca o sa vreau sa invat vreodata pentru ca nu stau sa imi bat capu cu prostii.

Sa fi iubit.

Link to comment
Share on other sites

There ... i fixed it! Am pus si sursa. Sunt chestii care mi se par mai interesante si le pun la "share" in speranta ca poate tie, tovaras de RST, poate-ti sunt de folos.

Daca vrei sa te afirmi cumva si nu stii cum s-o faci , be smart somewhere else.

Salut,

Sincer sa fiu da te cred pot fi de folos nu zic nu. Dar ce face scriptu care lai pus face si Hydra si multe altele. Sincer nu imi place sa ma afirm.

Nu o lua in nume de rau pentru commentul care lam facut.

C ya

Link to comment
Share on other sites

Password cracking - Wikipedia, the free encyclopedia

"Brute-force cracking, in which a computer tries every possible key or password until it succeeds, is the lowest common denominator of password cracking. More common methods of password cracking, such as dictionary attacks, pattern checking, word list substitution, etc., attempt to reduce the number of trials required and will usually be attempted before brute force. Higher password bit strength increases exponentially the number of candidate passwords that must be checked, on average, to recover the password and reduces the likelihood that the password will be found in any cracking dictionary."

Link to comment
Share on other sites

Password cracking - Wikipedia, the free encyclopedia

"Brute-force cracking, in which a computer tries every possible key or password until it succeeds, is the lowest common denominator of password cracking. More common methods of password cracking, such as dictionary attacks, pattern checking, word list substitution, etc., attempt to reduce the number of trials required and will usually be attempted before brute force. Higher password bit strength increases exponentially the number of candidate passwords that must be checked, on average, to recover the password and reduces the likelihood that the password will be found in any cracking dictionary."

Salut,

Brute-force attack nu e acelasi lucru cu dictionary attack si sti bine asta.

Sa fi iubit !

Link to comment
Share on other sites

Salut,

Sincer sa fiu da te cred pot fi de folos nu zic nu. Dar ce face scriptu care lai pus face si Hydra si multe altele. Sincer nu imi place sa ma afirm.

Nu o lua in nume de rau pentru commentul care lam facut.

C ya

Jessus fingering Christ .... deci bun, te supara ca face si Hydra.

Ok !! si din acest motiv eu sunt PRAF !!!111001!!.

Prietene .. eu raman praf, si tu crezi ce vrei sa crezi.

whatever

Link to comment
Share on other sites

Jessus fingering Christ .... deci bun, te supara ca face si Hydra.

Ok !! si din acest motiv eu sunt PRAF !!!111001!!.

Prietene .. eu raman praf, si tu crezi ce vrei sa crezi.

whatever

Salut,

Intelegi cu totul gresit. Iti mai spun odata. Eu am dat comentul pentru ca:

Nu am stiut ca tu ai dat copy/paste la descrierea scriptului pentru ca nu ai precizat sursa.

Nu ma supara ca face ce face si Hydra si altele si tiam spus si iti repet nu o lua in nume de rau dar poate daca specificai sursa deunde ai dat copy/paste nu mai aveam discutia asta acuma.

C ya

Link to comment
Share on other sites

Salut,

Intelegi cu totul gresit. Iti mai spun odata. Eu am dat comentul pentru ca:

Nu am stiut ca tu ai dat copy/paste la descrierea scriptului pentru ca nu ai precizat sursa.

Nu ma supara ca face ce face si Hydra si altele si tiam spus si iti repet nu o lua in nume de rau dar poate daca specificai sursa deunde ai dat copy/paste nu mai aveam discutia asta acuma.

C ya

:| Oare si-a dat seama ca nu vorbeste prin PM?

Ce pot sa zic, te contrazici singur.

Link to comment
Share on other sites

:| Oare si-a dat seama ca nu vorbeste prin PM?

Ce pot sa zic, te contrazici singur.

Salut,

Okay e parerea ta si o respect dar cum am mai spus daca postul avea sursa nu ajungeam la discutiile acestea, plus, hai sa fim seriosi si sa vorbim frumos fara injuraturi ca nu suntem copiii de pe Facebook....

Sa fi iubit!

Edited by securityfocus.eu
Link to comment
Share on other sites

Am testat acest Bruteforce, mai bine spus "Dictionary attack" si pe un singur target cu multi theard merge fara probleme si pe deasupra repede dar pe mai multe targete+theaduri deodata nu mai da randament.

Testat pe modulu "smtp_login", multi target(ip,user,password=LIST) + multi theard pe o lista de vreo 20 smtp-uri vulnerabile si verificate inainte de a le baga in "Petator Dictionary attack".

Mai jos observam 3 servere de smtp la care a reusit autentificarea cu succes, 1 nereusit, 1 fail si 2 erori care apar incontinu.


05:55:59 patator INFO - 235 25 | 173.9.86.81:test:password | 13 | Authentication successful
05:55:59 patator INFO - 235 32 | 71.146.247.179:test:password | 28 | 2.7.0 Authentication successful.
05:56:02 patator INFO - 235 32 | 79.123.90.202:test:password | 34 | 2.7.0 Authentication successful.
05:56:08 patator INFO - 535 34 | test:admin:173.63.47.19 |123 | 5.7.3 Authentication unsuccessful.
05:56:50 patator INFO - 535 28 | test:admin:99.89.25.201 | 136 | Error: authentication failed
05:56:50 patator INFO - 535 12 | 173.165.33.109:test:password | 7 | auth failure
05:60:30 patator WARNING - xxx | 123.2.170.205:test:password | 1 | <class 'socket.error'>, (110, 'Connection timed out')
05:60:30 patator WARNING - xxx | 87.224.82.83:test:password | 37 | <type 'exceptions.ValueError'>, ('need more than 1 value to unpack',)

Nu am pus toata activitatea de la Petator ce s-a desfasurat in timpul atackului deoarece nu are rost, am pus doar ce m-a intersat si este important.

Hai sa comentam de exemplu eroarea cu socket.

Eroarea 1: Connection timed out. = <class 'socket.error'>, (110, 'Connection timed out')

A connection attempt failed because the connected party did not properly respond after a period of time, or the established connection failed because the connected host has failed to respond.

  • Daca nu a reusit stabilirea conexiunii(conectarea pe acel port) din motive diferite, cum ar fi:
    - a) Smtp Server(port) oprit
    - B) Port-ul este blockat
    - c) Ip-ul este down
    - Etc. ar fi trebuit sa dea eroarea "auth failure" finca setarea este --failure-delay=10 --max-retries=1 iar smtp-ul functioneaza
    - Am testat cu un singur target(tot acelasi ip 123.2.170.205) care a primit eroarea de mai sus despre care vorbim si ce sa vedem ? A disparut eroarea cu socket si am primit eroarea cu "auth failure" cum este normal. Daca dam atack pe multi target primim erori.
    - Observam 1 singur target fara acele erori cu socket.

    07:03:24 patator INFO - 535 12 | test:smtp:173.165.33.109 | 1 | auth failure
    07:03:26 patator INFO - 535 12 | test:support:173.165.33.109 | 3 | auth failure
    07:03:26 patator INFO - 535 12 | test:staff:173.165.33.109 | 2 | auth failure
    07:03:28 patator INFO - 535 12 | test:password:173.165.33.109 | 6 | auth failure
    07:03:31 patator INFO - 535 12 | test:test:173.165.33.109 | 7 | auth failure
    07:03:36 patator INFO - 535 12 | test:backup:173.165.33.109 | 4 | auth failure
    07:03:36 patator INFO - 535 12 | test:admin:173.165.33.109 | 8 | auth failure
    07:03:41 patator INFO - 535 12 | test:sales:173.165.33.109 | 5 | auth failure

Eroarea 2: <type 'exceptions.ValueError'>, ('need more than 1 value to unpack',)

Nu are rost sa mai vorbesc despre aceasta eroare si nici nu as avea ce sa spun in privinta ei.

Sa punem varianta ca l-au scris gresit si au fost informati despre erorile care provin cand folosim "multi target" dar inca nu le-au rezolvat.

Daca trecem cu vederea peste acele erori, tot ramane varianta ca, face atack incredibil de greu pe mai multe targete deodata.

51 secunde a durat pe 1 singur target cu 1 user si 8 parole. Setat=--failure-delay=0.2 --max-retries=1.

Pare a nu functiuna, lua in calcul setarea "--failure-delay=secunde".


07:23:35 patator INFO - Starting Patator v0.3 (http://code.google.com/p/patator/) at 2012-01-12 07:23 EET
07:23:35 patator INFO -
07:23:35 patator INFO - code & size | candidate | num | mesg
07:23:35 patator INFO - ---------------------------------------------------------------
07:24:18 patator INFO - 535 12 | test:test:173.165.33.109 | 7 | auth failure
07:24:19 patator INFO - 535 12 | test:admin:173.165.33.109 | 8 | auth failure
07:24:19 patator INFO - 535 12 | test:support:173.165.33.109 | 3 | auth failure
07:24:20 patator INFO - 535 12 | test:backup:173.165.33.109 | 4 | auth failure
07:24:22 patator INFO - 535 12 | test:staff:173.165.33.109 | 2 | auth failure
07:24:24 patator INFO - 535 12 | test:password:173.165.33.109 | 6 | auth failure
07:24:25 patator INFO - 535 12 | test:smtp:173.165.33.109 | 1 | auth failure
07:24:26 patator INFO - 535 12 | test:sales:173.165.33.109 | 5 | auth failure
07:24:26 patator INFO - Hits/Done/Size/Fail: 8/8/8/0, Avg: 0 r/s, Time: 0h 0m [color=red]51s[/color]

De aici va dati si voi seama ca nu merita sa faci brute pe multi target atata timp cat pe 1 singur target cu 1 user si 8 parole dureaza 1 min.

Astept si parerile voastre cei care l-au testat "multi target+theard-uri" ce rezultat ati capatat.

In legatura cu "THC-Hydra" tot pe modulu de smtp si "multi target+theard-uri" are ca rezultat tot un esec ca si acest "Petator - Dictionary attack".

Sunt foarte bine gandite si scrise dar mai putin la partea de multi target.

  • Upvote 1
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...