Nmap Development mailing list archives
network bruteforce
From: flacman Cuteam <flacman () cuteam org>
Date: Sun, 28 Jun 2009 01:58:00 -0500
Hi, by a message from fyodor i knew that u have the idea of making a
"bruteforce" app over network protocols, i started a project like this
one a week ago, and here are some ideas i implement in my app:
Feature Hydra Medussa
Bruter (mine)
Languaje C C
C#/C++/C
MultiTask fork thread
ThreadPool
SocketsManagement normal normal
SocketPool
SSL OpenSSL(veryOld) OpenSSL 0.97
OpenSSL 0.98
SSLSupport SSLv2 SSLv23(maneged
by modules) SSLv23 y TSL (in a future TSL, managed by users)
ManejoSSL C C
C embedded in a library
Design Built-In Modular
Modular
ErrorManagement NO NO
Yes, based in successful connections & hacks to servers (e.g if the
server only accepts 3 connections at a time, don't send more than 3)
Some results of this new architecture:
(10 threads-processes)
App Tries Time Tries/Min
Hydra 100 257s 23.34
Bruter 100 113s 48.11
you could see the code (please no comments about the coding, still
building it, some "parts" are just for testing, so it's awful) in
http://code.google.com/p/bruter/
There is a lot to do, but it's going to be nice
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org
Current thread:
- network bruteforce flacman Cuteam (Jun 28)
