Nmap Development mailing list archives

Ncrack 0.2ALPHA Released


From: ithilgore <ithilgore.ryu.l () gmail com>
Date: Sun, 13 Jun 2010 03:59:37 +0300

Hello nmap-dev folks.

I am pleased to announce the 0.2ALPHA release of the high-speed
network authentication cracking tool Ncrack. It allows for rapid and
accurate large-scale auditing of multiple hosts and has many exciting
features to automate, speed up, and customize the network cracking
process.

Here are the change highlights since the 0.01ALPHA release last
August:

* The --resume option, which allows users to cancel and resume a cracking
  session at will.

* -iN and -iX options that allow Ncrack to automatically obtain targets
  by parsing Nmap's -oN normal and -oX XML output files.

* Interactive output has been improved and user can now press the 'p' key
  to print any discovered credentials found so far. You can
  still get basic statistics (cracking rate, number of credentials found
  so far etc) by pressing 'enter' or another key at any time.

* Integration of Nmap's optimized password list as the default one. This
  will help improve cracking session by trying the most common passwords
  first.

* Added Experimental pop3(s) support.

* And many bug fixes and code cleanup.

A source code tarball, Windows setup executable, and Mac OS X dmg
installer are all available from the website:

http://nmap.org/ncrack

You can also find an online version of the man page at:

http://nmap.org/ncrack/man.html

In addition, you can always download the latest svn source code like this:
svn co --username guest --password "" svn://svn.insecure.org/ncrack

We're calling for testers to try Ncrack, report any problems or bugs
found, express their views on possible improvements and new features
they might want in the future and in general have fun playing with it!
Send all feedback to the nmap-dev mailing list
(nmap-dev () insecure org).


And here is the full list of changes since 0.01ALPHA:

o Ncrack now interactively prints out discovered credentials whenever
  the user presses the 'p' key.  Also, in verbose mode (-v), Ncrack
  now prints new credentials whenever they are discovered.  Basic
  statistics (cracking rate, number of credentials found, but not the
  credentials themselves) can be obtained by pressing enter or another
  key at any time.

o Added the --resume option, which allows users to cancel (usually by
  pressing Ctrl+C) and later restore a cracking session through a file
  with the saved state. The Ncrack restoration file is saved at
  .ncrack/ under the home user's directory for *nix systems and inside
  the user's profile directory (normally under C:\Documents and
  Settings\<user>\.ncrack\) in Windows. The file name format is
  restore.<date>_<time> e.g: restore.2009-11-1_10-10 . The time isn't
  in XX:XX format because Windows doesn't allow colons in filenames.

o Implemented the -iN option which lets Ncrack review Nmap normal
  (-oN) output to find targets.

o Implemented -iX option, which allows Ncrack to obtain targets by
  reading an Nmap XML (-oX) output format file.

o Ncrack's help screen (ncrack -h) now includes practical real-life
  examples as well as a list of protocol cracking modules supported.
  You can also list the supported modules with -V.

o Added experimental pop3(s) support - patch initially made by Bucsay
  Balazs and then modified by Ithilgore.

o Ncrack now shares the Nsock library with Nmap rather than having its
  own fork.  This makes maintenance much easier.  This was
  accomplished by adding a way to compile Nsock without Libpcap (which
  Ncrack doesn't use).

o Fixed a timeout-related error which was due to the way Nsock caches
  its time values to avoid too many gettimeofday() system calls,
  leading to Ncrack thinking that negative time had elapsed in some
  cases.  See the report at http://seclists.org/nmap-dev/2010/q2/450.

o Fixed bug which caused an endless loop before Ncrack could exit
  properly (reported at http://seclists.org/nmap-dev/2010/q2/746).

o Fixed several memory leaks with the help of Valgrind. Also conducted a
  Valgrind test for all modules. A report on a big memory leak was made
  here: http://seclists.org/nmap-dev/2010/q1/1140

o Fixed a problem which lead to the configure script being executed
  twice for each of Ncrack's dependency libraries.  Compilation is
  much faster now.

o Added cleanup function for modules. This is made possible by a
  function pointer (ops_free) in the Connection class, that
  deallocates all internal struct members of misc_info . Since these
  are module-specific data, each module should initialize this
  function upon first invocation.

o Added a snprintf function to Buf class. This is really handy for
  module writers since it allows multiple I/O operations in
  one line.

o Changed the module API Connection class to split the old iobuf
  system into two separate iobufs (one for inbound and one for
  outbound data).

o We now use the same default password list as Nmap, which is based on
  data from many compromised/leaked systems.  We also have included
  several individual files which can be used instead, such as Solar
  Designer's password file from his cracking application John.

o Added the --user and --pass options for command-line user and
  password list specification.

o Reported to Microsoft an issue on Windows (running on Windows rather
  than against it) which was slowing the scans down
  (http://seclists.org/nmap-dev/2009/q2/774). Microsoft wasn't able to
  reproduce the problem
(https://connect.microsoft.com/WNDP/feedback/ViewFeedback.aspx?FeedbackID=479640),
  but it seems that changes made by ESET Nod32 AV on Ithilgore's
  machine may have been the problem.  It works for him if he disables
  Nod32, so users might consider trying that if they experience poor
  performance.

o Fixed a compilation failure which occurred at linking when OpenSSL
  was not available on the system.

o Added this CHANGELOG file to the distribution.


Regards,
ithilgore


-- 
http://sock-raw.org
http://twitter.com/ithilgore
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: