See feature sets and services coverage page – incl. a speed comparison against ncrack and medusa.Number one of the biggest security holes are passwords, as every password security study shows.
This tool is a proof of concept code, to give researchers and security consultants the possiblity to show how easy it would be to gain unauthorized access from remote to a system.
There are already several login hacker tools available, however none does either support more than one protocol to attack or support parallized connects.
It was tested to compile cleanly on Linux, Windows/Cygwin, Solaris, FreeBSD/OpenBSD, QNX (Blackberry 10) and OSX.Currently this tool supports the following protocols:
Asterisk, AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP, HTTP-FORM-GET, HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-PROXY, HTTPS-FORM-GET, HTTPS-FORM-POST, HTTPS-GET, HTTPS-HEAD, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, Oracle SID, Oracle, PC-Anywhere, PCNFS, POP3, POSTGRES, RDP, Rexec, Rlogin, Rsh, SAP/R3, SIP, SMB, SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP.
CHANGELOG for 8.5
CHANGELOG for 8.5 =================== ! Development moved to a public github repository: http://ift.tt/1korjAy ! Reports came in that the rdp module is not working reliable sometimes, most likely against new Windows versions. please test, report and if possible send a fix * New command line option: -b : format option for -o output file (json only so far, happy for patches supporting others :) ) – thanks to veggiespam for the patch * ./configure now honors the CC enviroment variable if present * Fix for the restore file crash on some x64 platforms (finally! thanks to lukas227!) * Changed the format of the restore file to detect cross platform copies * Fixed a bug in the NCP module * Favor strrchr() over rindex() * Added refactoring patch by diadlo * Updated man page with missing command line options