Penetration Testing mailing list archives
Re: Brute-forcing Dial-up password after war-dial
From: Tomas Nybrand <nybrand () home se>
Date: Tue, 23 Sep 2003 18:46:12 +0200
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Thursday 18 September 2003 17.55, Michelangelo Sidagni wrote:
After a war dial, I obtained a list of phone numbers that responded with a carrier (PPP or other). Is there a free tool out there that bruteforce Dial-up ID and passwords on the numbers identified by the war dial? I know that PhoneSweep does that, but is there a workaround / free program to do that? Thanks Mike
Hi Have you looked at THC:s tool "THC-Dialup Login Hacker" ? You can find it under thc/releases ( http://www.thc.org/download.php?t=r&d=login_hacker-1.1.tar.gz ) Good luck! - -- mvh/ Tomas Nybrand - - Bene qui latuit, bene vixit. - -----BEGIN PGP SIGNATURE----- Version: PGP 6.5.8 iQA+AwUBP3B422Sny2W4kBZqEQIqNACYqu5szb9+AfkU6cBEkqb8W62bWACg/h1a ELdy2WiIyxjdS362NPtvKfw= =+Jdf -----END PGP SIGNATURE----- --------------------------------------------------------------------------- ----------------------------------------------------------------------------
Current thread:
- RE: Brute-forcing Dial-up password after war-dial Hagen, Eric (Sep 19)
- RE: Brute-forcing Dial-up password after war-dial Yanisto (Sep 29)
- <Possible follow-ups>
- Re: Brute-forcing Dial-up password after war-dial noconflic (Sep 22)
- Re: Brute-forcing Dial-up password after war-dial Tomas Nybrand (Sep 23)