Nmap Development mailing list archives
network bruteforce
From: flacman Cuteam <flacman () cuteam org>
Date: Sun, 28 Jun 2009 01:58:00 -0500
Hi, by a message from fyodor i knew that u have the idea of making a "bruteforce" app over network protocols, i started a project like this one a week ago, and here are some ideas i implement in my app: Feature Hydra Medussa Bruter (mine) Languaje C C C#/C++/C MultiTask fork thread ThreadPool SocketsManagement normal normal SocketPool SSL OpenSSL(veryOld) OpenSSL 0.97 OpenSSL 0.98 SSLSupport SSLv2 SSLv23(maneged by modules) SSLv23 y TSL (in a future TSL, managed by users) ManejoSSL C C C embedded in a library Design Built-In Modular Modular ErrorManagement NO NO Yes, based in successful connections & hacks to servers (e.g if the server only accepts 3 connections at a time, don't send more than 3) Some results of this new architecture: (10 threads-processes) App Tries Time Tries/Min Hydra 100 257s 23.34 Bruter 100 113s 48.11 you could see the code (please no comments about the coding, still building it, some "parts" are just for testing, so it's awful) in http://code.google.com/p/bruter/ There is a lot to do, but it's going to be nice _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://SecLists.Org
Current thread:
- network bruteforce flacman Cuteam (Jun 28)