Brute Forcing: Difference between revisions
From /i/nsurgency W/i/ki
Jump to navigationJump to search
>Allo allo No edit summary |
|||
Line 14: | Line 14: | ||
*[http://www.hoobie.net/brutus/brutus-download.html Brutus] | *[http://www.hoobie.net/brutus/brutus-download.html Brutus] | ||
**[http://giblee.googlepages.com/brutus.txt Brutus Tutorial] | **[http://giblee.googlepages.com/brutus.txt Brutus Tutorial] | ||
* [http://anonym.to/http://www.openwall.com/john/ John the Ripper] | |||
=Proxy Lists= | =Proxy Lists= |
Revision as of 20:15, 22 April 2009
Brute Forcing is a method of cracking passwords, that involves rotating through randomized strings until the correct one is discovered. There are two forms of brute force attacks--one is dictionary style, where many pre-made strings are tried, while the other creates random strings from random numbers/integers. The former is faster, but does not always work, while the latter is slowpoke but will eventually get it.
Wordlists/Dictionaries
A file that contains a large number of words. Used for brute forcing passwords. Normally in a .txt format or some other easily readable and editable format.
- http://anonym.to/ftp://ftp.ox.ac.uk/pub/wordlists/
- http://anonym.to/ftp://ftp.cerias.purdue.edu/pub/dict/wordlists
- http://anonym.to/http://www.outpost9.com/files/WordLists.html
- http://anonym.to/http://packetstormsecurity.org/Crackers/wordlists/
Programs
Proxy Lists
Pr0xies page has a looong list. Then check them with this. Charon
Why do I need a proxy? To disguise where you come from.