Home page logo
/

pen-test logo Penetration Testing mailing list archives

Re: Brute-forcing Dial-up password after war-dial
From: Tomas Nybrand <nybrand () home se>
Date: Tue, 23 Sep 2003 18:46:12 +0200

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Thursday 18 September 2003 17.55, Michelangelo Sidagni wrote:
After a war dial, I obtained a list of phone numbers that responded with a
carrier (PPP or other). Is there a free tool out there that bruteforce
Dial-up ID and passwords on the numbers identified by the war dial? I know
that PhoneSweep does that, but is there a workaround / free program to do
that?

Thanks

Mike

Hi

Have you looked at THC:s tool  "THC-Dialup Login Hacker" ?
You can find it under thc/releases 
( http://www.thc.org/download.php?t=r&d=login_hacker-1.1.tar.gz )

Good luck!

- -- 
mvh/ Tomas Nybrand

- - Bene qui latuit, bene vixit. -



-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8

iQA+AwUBP3B422Sny2W4kBZqEQIqNACYqu5szb9+AfkU6cBEkqb8W62bWACg/h1a
ELdy2WiIyxjdS362NPtvKfw=
=+Jdf
-----END PGP SIGNATURE-----


---------------------------------------------------------------------------
----------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault