Brute Forcing: Difference between revisions

From /i/nsurgency W/i/ki
Jump to navigationJump to search
>Hitlerlol
New page: Brute Forcing is a method of cracking passwords, that involves rotating through randomized strings until the correct one is discovered. There are two forms of brute force attacks--one is ...
 
(5 intermediate revisions by 3 users not shown)
Line 12: Line 12:
* [http://anonym.to/http://www.oxid.it/cain.html Cain & Abel]
* [http://anonym.to/http://www.oxid.it/cain.html Cain & Abel]
** [http://anonym.to/http://www.oxid.it/ca_um/ C&A Tutorial]
** [http://anonym.to/http://www.oxid.it/ca_um/ C&A Tutorial]
*[http://www.hoobie.net/brutus/brutus-download.html Brutus]
**[http://giblee.googlepages.com/brutus.txt Brutus Tutorial]
* [http://anonym.to/http://www.openwall.com/john/ John the Ripper]


=Proxy Lists=
=Proxy Lists=
Line 18: Line 21:


Why do I need a proxy? To disguise where you come from.
Why do I need a proxy? To disguise where you come from.
[[Category:Methods]]

Latest revision as of 20:15, 22 April 2009

Brute Forcing is a method of cracking passwords, that involves rotating through randomized strings until the correct one is discovered. There are two forms of brute force attacks--one is dictionary style, where many pre-made strings are tried, while the other creates random strings from random numbers/integers. The former is faster, but does not always work, while the latter is slowpoke but will eventually get it.

Wordlists/Dictionaries[edit]

A file that contains a large number of words. Used for brute forcing passwords. Normally in a .txt format or some other easily readable and editable format.

Programs[edit]

Proxy Lists[edit]

Pr0xies page has a looong list. Then check them with this. Charon

Why do I need a proxy? To disguise where you come from.