Showing posts sorted by relevance for query THC-HYDRA. Sort by date Show all posts
Showing posts sorted by relevance for query THC-HYDRA. Sort by date Show all posts

THC-HYDRA 6.4 is Now Available



One of the most famous network logon cracker – THC-HYDRA, has been updated. We now have THC-HYDRA version 6.4!
THC-HYDRA is a very fast network logon cracker which support many different services. This tool is a proof of concept code, to give researchers and securityconsultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. It was tested to compile cleanly on Linux,Windows/Cygwin, Solaris, FreeBSD and OSX.

Changelog for thc-hydra v6.4

Update SIP module to extract and use external IP addr return from server error to bypass NAT
Update SIP module to use SASL lib
Update email modules to check clear mode when TLS mode failed
Update Oracle Listener module to work with Oracle DB 9.2
Update LDAP module to support Windows 2008 active directory simple auth
Fix to the connection adaptation engine which would loose planned attempts
Fix make script for CentOS, reported by ya0wei
Print error when a service limits connections and few pairs have to be tested
Improved Mysql module to only init/close when needed
Added patch from the FreeBSD maintainers
Module usage help does not need a target to be specified anymore
configure script now honors /etc/ld.so.conf.d/ directory


Download THC-HYDRA v6.4 (hydra-6.4-src.tar.gz)  here.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

THC-HYDRA v6.5


THC-HYDRA is a very fast network logon cracker which support many different services. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. It was tested to compile cleanly on Linux, Windows/Cygwin, Solaris, FreeBSD and OSX

New Features of THC Hydra v6.5:-
  • Added dpl4hydra script by Roland Kessler, which creates a default password for a device. Thanks!
  • Improved HTTP form module: getting cookie, fail or success condition, follow multiple redirections, support cookie gathering URL, multiple user defined headers
  • Added interface support for IPv6, needed for connecting to link local fe80:: addresses. Works only on Linux and OS/X. Information for Solaris and *BSD welcome
  • Added -W waittime between connects option
  • The -x bruteforce mode now allows for generated password amounts > 2 billion
  • Fix if -L was used together with -x
  • Fixes for http- modules when the http-…://target/options format was used
  • Fixed a bug in the restore file write function that could lead to a crash
  • Fixed XMPP module jabber init request and challenge response check, thx “F e L o R e T”
  • Fix: if a proxy was used, unresolveable targets were disabled. now its fine
  • Fix for service://host/ usage if a colon was used after the URI without a port defined


Download THC-HYDRA v6.5 (hydra-6.5-src.tar.gz)
here.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

THC-HYDRA Updated Version 7.2 Released

THC-HYDRA Updated Version 7.2 Released 

Earlier we have discussed many times about THC-HYDRA. Now the developer officially released the updated version of the world's one of the most fastest login cracker Ver 7.2. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. It was tested to compile cleanly on Linux, Windows/Cygwin, Solaris, FreeBSD and OSX. Additional information can be found here

Official Change Log:- 
  • Speed-up http modules auth mechanism detection
  • Fixed -C colonfile mode when empty login/passwords were used (thanks to will(at)configitnow(dot)com for reporting)
  • The -f switch was not working for postgres, afp, socks5, firebird and ncp, thanks to Richard Whitcroft for reporting!
  • Fixed NTLM auth in http-proxy/http-proxy-url module
  • Fixed URL when being redirected in http-form module, thanks to gash(at)chaostreff(dot)at
  • Fix MSSQL success login condition, thanks to whistle_master(at)live(dot)com
  • Fix http form module: optional headers and 3xx status redirect, thx to Gash
  • Fix in configure script for –prefix option, thanks to dazzlepod
  • Update of the dpl4hydra script by Roland Kessler, thanks!
  • Small fix for hydra man page, thanks to brad(at)comstyle(dot)com

To Download THC-HYDRA 7.2 Click Here


 

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

THC-HYDRA ver7.0 (Network Logon Cracker)


THC-HYDRA is a very fast network logon cracker which support many different services. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. It was tested to compile cleanly on Linux, Windows/Cygwin, Solaris, FreeBSD and OSX.

Official change log for THC-HYDRA v7.0:-

  • New main engine for hydra: better performance, flexibility and stability
  • New option -u – loop around users, not passwords
  • Option -e now also works with -x and -C
  • Added RDP module, domain can be passed as argument
  • Added other_domain option to smb module to test trusted domains
  • Small enhancement for http and http-proxy module for standard ignoring servers
  • Lots of bugfixes, especially with many tasks, multiple targets and restore file
  • Fixes for a few http-form issues
  • Fix smb module NTLM hash use
  • Fixed Firebird module deprecated API call
  • Fixed for dpl4hydra to work on old sed implementations (OS/X …)
  • Fixed makefile to install dpl4hydra (thx @sitecrea)
  • Fixed local buffer overflow in debug output function (required -d to be used)
  • Fixed xhydra running warnings and correct quit action event
 To download THC-HYDRA ver7.0 Click Here

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

THC-IPv6 Attack Toolkit, A Tool to Attack the Inherent Protocol Weaknesses of IPV6 & ICMP6


THC-IPv6 Attack Toolkit, A Tool to Attack the Inherent Protocol Weaknesses of IPV6 & ICMP6

German hackers group, widely known as THC -The Hacker's Choice released an comprehensive attack toolkit for the IPv6 protocol suite named 'THC-IPv6 Attack Toolkit'. THC is the first group who is releasing such attacking tool for IPv6 protocol. According to the release note this is  a complete tool set to attack the inherent protocol weaknesses of IPV6 and ICMP6, and includes an easy to use packet factory library. It comprises of state-of-the-art tools for alive scanning, man-in-the-middle attacks, denial-of-service etc. which exploits inherent vulnerabilities in IPv6. 

Features at a Glance:- 
  • parasite6: icmp neighbor solitication/advertisement spoofer, puts you as man-in-the-middle, same as ARP mitm (and parasite)
  • alive6: an effective alive scanng, which will detect all systems listening to this address
  • dnsdict6: parallized dns ipv6 dictionary bruteforcer
  • fake_router6: announce yourself as a router on the network, with the highest priority
  • redir6: redirect traffic to you intelligently (man-in-the-middle) with a clever icmp6 redirect spoofer
  • toobig6: mtu decreaser with the same intelligence as redir6
  • detect-new-ip6: detect new ip6 devices which join the network, you can run a script to automatically scan these systems etc.
  • dos-new-ip6: detect new ip6 devices and tell them that their chosen IP collides on the network (DOS).
  • trace6: very fast traceroute6 with supports ICMP6 echo request and TCP-SYN
  • flood_router6: flood a target with random router advertisements
  • flood_advertise6: flood a target with random neighbor advertisements
  • exploit6: known ipv6 vulnerabilities to test against a target
  • denial6: a collection of denial-of-service tests againsts a target
  • fuzz_ip6: fuzzer for ipv6
  • implementation6: performs various implementation checks on ipv6
  • implementation6d: listen daemon for implementation6 to check behind a fw
  • fake_mld6: announce yourself in a multicast group of your choice on the net
  • fake_mld26: same but for MLDv2
  • fake_mldrouter6: fake MLD router messages
  • fake_mipv6: steal a mobile IP to yours if IPSEC is not needed for authentication
  • fake_advertiser6: announce yourself on the network
  • smurf6: local smurfer
  • rsmurf6: remote smurfer, known to work only against linux at the moment
  • sendpees6: a tool by willdamn(ad)gmail.com, which generates a neighbor solicitation requests with a lot of CGAs (crypto stuff ;-) to keep the CPU busy. nice.
  • thcping6: sends a hand crafted ping6 packet [and about 25 more tools for you to discover]
For detailed information about the usage, library interface & so on click here. To Download THC-IPv6 Attack Toolkit Click Here (Linux Only). For those who are hearing the name THC first time, we want to give you reminder that before this tool, this German hackers group published few other hack tools like Hydra (Fastest Login Cracker), THC SSL Dos and so on. 






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Patator -A Multi-Purpose Brute-Forcer


Earlier we have several times talked about Brute forcer tool like THC-Hydra, Cain & Abel, Rainbow Crack and many more. Today we will discuss about Patator is a multi-purpose brute-forcer, written in pyton language, with a modular design and a flexible usage. Can be modified and rewritten as per our environment requirement. Patator is licensed GPLv2.

Modules Supported:-
ftp_login : Brute-force FTP
ssh_login : Brute-force SSH
telnet_login : Brute-force Telnet
smtp_login : Brute-force SMTP
smtp_vrfy : Enumerate valid users using the SMTP VRFY command
smtp_rcpt : Enumerate valid users using the SMTP RCPT TO command
http_fuzz : Brute-force HTTP/HTTPS
pop_passd : Brute-force poppassd (not POP3)
ldap_login : Brute-force LDAP
smb_login : Brute-force SMB
mssql_login : Brute-force MSSQL
oracle_login : Brute-force Oracle
mysql_login : Brute-force MySQL
pgsql_login : Brute-force PostgreSQL
vnc_login : Brute-force VNC
dns_forward : Forward lookup subdomains
dns_reverse : Reverse lookup subnets
snmp_login : Brute-force SNMPv1/2 and SNMPv3
unzip_pass : Brute-force the password of encrypted ZIP files
keystore_pass: Brute-force the password of Java keystore files

Features of Patator:-
  • No false negatives, as it is the user that decides what results to ignore based on:
  • status code of response
  • size of response
  • matching string or regex in response data
  • Modular design
  • not limited to network modules (eg. the unzip_pass module)
  • not limited to brute-forcing (eg. remote exploit testing, or vulnerable version probing)
  • Interactive runtime
  • show verbose progress
  • pause/unpause execution
  • increase/decrease verbosity
  • add new actions & conditions during runtime in order to exclude more types of response from showing
  • Use persistent connections (ie. will test several passwords until the server disconnects)
  • Multi-threaded
  • Flexible user input
  • Any part of a payload is fuzzable:
  • use FILE[0-9] keywords to iterate on a file
  • use COMBO[0-9] keywords to iterate on the combo entries of a file
  • use NET[0-9] keywords to iterate on every host of a network subnet

To Download Patator Click Here 



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...