Brute Force
Brute Force
Brute Force
by
--------B.Vikas
WHAT IS BRUTE
FORCE?
Brute force (also known as brute force cracking) is a trial and
error method used to decode encrypted data such as passwords or
Data Encryption Standard (DES) keys, through exhaustive effort
(using brute force) rather than employing intellectual strategies.
Brute force cracking application proceeds through all possible
combinations of legal characters in sequence. Brute force is
considered to be an infallible, although time-consuming,
approach.
Determining the Difficulty of a Brute
Force Attack
power
Extends the amount of time needed to crack the
THC-Hydra
This tool allows for rapid dictionary attacks against network login systems,
including FTP, POP3, IMAP, Netbios, Telnet, HTTP Auth, LDAP NNTP,
VNC, ICQ, Socks5, PCNFS, and more. It includes SSL support and is
apparently now part of Nessus.
Platform: UNIX
TSGrinder
TSGrinder is the first production Terminal Server brute
force tool. And having an encrypted channel to the TS
logon process sure helps to keep IDS from catching the
attempts. It is a "dictionary" based attack tool, but it does
have some interesting features like "l337" conversion, and
supports multiple attack windows from a single dictionary
file. It supports multiple password attempts in the same
connection, and allows you to specify how many times to
try a username/password combination within a particular
connection.
Platform: Windows
Bibliography
"Brute-Force Exploitation of Web Application Session ID's", David Endler - iDEFENSE
Labs
[2] http://www.cgisecurity.com/lib/SessionIDs.pdf
"Brute force attack incidents", the Web Hacking Incidents Database
[3] http://whid.webappsec.org/whid-list/Brute%20Force
Credential/Session Prediction
[4] http://projects.webappsec.org/Credential-and-Session-Prediction
Predictable Resource Location
[5] http://projects.webappsec.org/Predictable-Resource-Location
"Card Security Code", Wikipedia
[6] http://en.wikipedia.org/wiki/Card_Verification_Value
"Color Assignment, Favorite Color", Joe Hallock
[7] http://www.joehallock.com/edu/COM498/preferences.html
THANK YOU