Brutus - a Brute force online password cracker

Brutus is an online based password cracker.

It works by trying to break telnet, POP3, FTP, HTTP, RAS or IMAP by simply trying to login as a legitimate users. Brutus imitates a real outside attack (unlike other password cracking applications that simulate an internal attack) and thus serves as a valuable security-auditing tool.

Brutus can run in single user mode (trying to break into a single user's account by trying different password combinations) or by trying a list of user/password combinations from a word file. The application scans the host for known services and can be easily customized to break-in any other custom service requiring interactive logon of a username and a password.

Using Brutus will teach you a lot about your system, since it simulates a real attack. To make a good use of Brutus's attack simulation an administrator should that note whether the break-in attempts are logged, and whether a timeout is issued after a few failed logins - this can be easily seen by the progress Brutus is making.

Brutus can be downloaded from: http://www.hoobie.net/brutus/




NOTE:-
This blog is developed in the hope that it will be useful for network administrators, teachers, security consultants/professionals, forensic staff, security software vendors, professional penetration tester and everyone else that plans to use it for ethical reasons. (I) The blog owner will not help or support any illegal activity done with this program. Be warned that there is the possibility that you will cause damages and/or loss of data using this software and that in no events shall (I) the blog owner be liable for such damages or loss of data. Please read the License Agreement in the program carefully before using it.

Comments

Popular posts from this blog

VMware PSOD Purple Screen of Death - Debugger waiting (world 2078) -- no port for remote debugger. "Escape" for local debugger

The Windows Time Service terminated with the following error - Event ID 7023 & 46

IBM x3650 M4 Series Server Model - Activation Keys Backup to be taken for IMM Moduel II, why?