Penetration Testing mailing list archives

RE: Brute-forcing Dial-up password after war-dial


From: "Hagen, Eric" <ehagen () DenverNewspaperAgency com>
Date: Fri, 19 Sep 2003 09:15:34 -0600

Careful that you have a written contract with the company you're
war-dialing.  Otherwise, it's often a felony in many jurisdicitions and even
if you don't penetrate anything, can land you in some serious hot water.

Assuming you DO have a contract with the company, there is one called THC
that would be worth a try.  It used to be hosted by a University, but it's
since been taken off their site IIRC.   It has a scripting language that
will let you script password attacks and I believe can even import a 'words'
or 'names' file if you choose.

Eric Hagen

-----Original Message-----
From: Michelangelo Sidagni [mailto:m.sidagni () verizon net]
Sent: Thursday, September 18, 2003 9:55 AM
To: pen-test () securityfocus com
Subject: Brute-forcing Dial-up password after war-dial




After a war dial, I obtained a list of phone numbers that responded with a
carrier (PPP or other). Is there a free tool out there that bruteforce
Dial-up ID and passwords on the numbers identified by the war dial? I know
that PhoneSweep does that, but is there a workaround / free program to do
that?



Thanks



Mike

---------------------------------------------------------------------------
FREE Trial!
New for security consultants and in-house pros: FOUNDSTONE PROFESSIONAL 
and PROFESSIONAL TL software. Fast, reliable vulnerability assessment 
technology powered by the award-winning FoundScan engine. Try it free for
21 days at: http://www.securityfocus.com/sponsor/Foundstone_pen-test_030825
----------------------------------------------------------------------------

---------------------------------------------------------------------------
FREE Trial!
New for security consultants and in-house pros: FOUNDSTONE PROFESSIONAL 
and PROFESSIONAL TL software. Fast, reliable vulnerability assessment 
technology powered by the award-winning FoundScan engine. Try it free for  21 days at: 
http://www.securityfocus.com/sponsor/Foundstone_pen-test_030825
----------------------------------------------------------------------------


Current thread: