Author | Message | Time |
---|---|---|
laurion | **This is technically a dictionary attack. Brute force, by me. VB6. Attempts to log on as a CHAT client. Uses socks4 protocol for proxies. Source code commented, for the most part. Educational use only. *INCLUDES* Source files Executable Needed .txt and .ini files http://www.javaop.com/uploads/guest/BruteForce.zip Please leave any comments, corrections or suggestions. Thanks to: iago for upload :) | May 14, 2005, 10:23 PM |
iago | Incidentally, if anybody cares, either "Auditor" or "Knoppix-std" (live Linux security-based distributions) comes with a 26mb dictionary file. It's pretty damn elite. I forget which one it is, though. | May 14, 2005, 11:22 PM |
laurion | http://packetstormsecurity.nl/Crackers/dicts.zip | May 14, 2005, 11:43 PM |
iago | That dictionary is small compared to the one I'm talking about :) I'll figure out which distro it is on Monday and let you know. | May 14, 2005, 11:50 PM |
R.a.B.B.i.T | Do you have anything better to do besides create tools meant to harass and steal? Get a life, please. | May 15, 2005, 12:25 AM |
KkBlazekK | The first thing I want to do with this is brute force tazo's account to teach him a lesson. | May 15, 2005, 12:48 AM |
UserLoser. | 26mb is nothing. I had a 3 gig file once which generated like every combination with letters from 2 characters to 12 in length. I don't think it ever finished though | May 15, 2005, 3:26 AM |
KkBlazekK | I had this program that created those files userloser, and the farthest I ever got was 35gb. I'll see if I can get it again from agarwaen. | May 15, 2005, 3:36 AM |
I_Smell_Tuna | Here is a BF DLL I made. Easy incrimentation for BF. http://68.58.200.72/bruteforce.zip | May 15, 2005, 5:27 AM |
Lenny | I really don't think it's necessary to store all the combinations into a file just to try each one. I'm sure the computer is well capable of generating them on the fly. Somewhat oxymoronic to call such a file a dictionary. | May 15, 2005, 5:30 AM |
Networks | Much easier method: Tell them to register for you forum or w/e, anything that uses md5 or even plain-text! if md5, break it in a couple hours max. Battle.net brute forcing is way to tedious. Also I can't believe you guys actually support this....-.- | May 15, 2005, 6:51 AM |
Topaz | You'd probably need only a hundred or so, assuming you're planning on bruting it longterm. Failed logon locks only last fifteen minutes, maybe more. | May 15, 2005, 7:07 AM |
iago | Lenny is correct: storing the random combinations in a file would be dumb. The dictionary that I talk of is actual phoenetic words (in various languages, leet-speakness, etc. Bruteforcing it if it's MD5, if it's a decent password, can still take a long time. A combination of 7 keyboard characters can take up to 15 days to guess. 8 would take longer than you'd be willing to wait. That's also assuming they use the same password for forums and Battle.net. I know I don't, I use a separate password for important things, and for things that somebody I don't trust has access to my password. Plus, if you're cool like me, your bot will automatically cycle your password :-) | May 15, 2005, 7:57 AM |
tA-Kane | [quote author=Lenny link=topic=11591.msg112506#msg112506 date=1116135047] I really don't think it's necessary to store all the combinations into a file just to try each one. I'm sure the computer is well capable of generating them on the fly.[/quote]Indeed. I once wrote an FTP brute forcer that generated passwords in order on-the-fly. It would save the current password that it's trying to disk, so that you could actually stop, reboot, and then resume where you left off. Useful for if you don't have a server to run it on and your computer crashes a lot (or you decide to reboot every time your installs or games don't work right). It actually got me into two different FTP sites, after about three months running on my server trying about 2.5 passwords/sec. | May 15, 2005, 9:26 AM |
I_Smell_Tuna | Did nobody notice the like to a DLL that generates random passwords on the fly? | May 15, 2005, 2:08 PM |
iago | [quote author=tA-Kane link=topic=11591.msg112533#msg112533 date=1116149205] [quote author=Lenny link=topic=11591.msg112506#msg112506 date=1116135047] I really don't think it's necessary to store all the combinations into a file just to try each one. I'm sure the computer is well capable of generating them on the fly.[/quote]Indeed. I once wrote an FTP brute forcer that generated passwords in order on-the-fly. It would save the current password that it's trying to disk, so that you could actually stop, reboot, and then resume where you left off. Useful for if you don't have a server to run it on and your computer crashes a lot (or you decide to reboot every time your installs or games don't work right). It actually got me into two different FTP sites, after about three months running on my server trying about 2.5 passwords/sec. [/quote] Writing to disk would slow it down a lot. L0phtcrack (LC4) can save the progress when you tell it. I really like LC4, I use it to crack the admin password on my computer at work. It's 14 characters, but lucky Windows splits it up into two 7-character buffers. What that means is that on Windows, there's no reason to make your passwords longer than 7 characters unless you know how to disable that style of password storage. | May 15, 2005, 4:18 PM |
spear | [quote author=Networks link=topic=11591.msg112511#msg112511 date=1116139897] Much easier method: Tell them to register for you forum or w/e, anything that uses md5 or even plain-text! if md5, break it in a couple hours max. Battle.net brute forcing is way to tedious. [/quote] If you visit Battle.net's website, specifically to their forums, you can logon to your Battle.net account through their website with your current Username/Password. You can select between all of their realms. You must also provide a cdkey. Bruting through their website would be MUCH more efficient, for numerous obvious reasons. 1. Doesn't require a Battle.net connection, thus no Proxies, and no IPban. 2. You can use CDKey's that are in use on Battle.net 3. The user does not see any Failed Login attempts, thus is unaware of your attack. It is also extreamly easy to make a bruter using simple PHP arguments. To save you some time, at the top right hand courner there is the box where you can login. http://www.battle.net/forums/board.aspx?ForumName=battlenet-status | May 15, 2005, 11:16 PM |
I_Smell_Tuna | Genius. | May 16, 2005, 12:27 AM |
LoRd | [quote]1. Doesn't require a Battle.net connection, thus no Proxies, and no IPban.[/quote] The webserver will deny you the ability to login after a very small number of failed attempts. | May 16, 2005, 12:38 AM |
I_Smell_Tuna | Even so it would be far easier to do it via HTTP. | May 16, 2005, 1:04 AM |
LoRd | [quote author=I_Smell_Tuna link=topic=11591.msg112601#msg112601 date=1116205469] Even so it would be far easier to do it via HTTP. [/quote] Actually, the forum requires that you hash both the password and the CD-Key before sending them, and in addition to that, you'd have to sort through the returned data for the result of the login, so it would actually be much slower than using the Telnet protocol, not mentioning that it would most likely also result in your CD-Key being banned. | May 16, 2005, 1:12 AM |
hismajesty | [quote author=I_Smell_Tuna link=topic=11591.msg112601#msg112601 date=1116205469] Even so it would be far easier to do it via HTTP. [/quote] Maybe if his password was 'a'. | May 16, 2005, 1:44 AM |
spear | [quote author=LoRd[nK] link=topic=11591.msg112598#msg112598 date=1116203926] [quote]1. Doesn't require a Battle.net connection, thus no Proxies, and no IPban.[/quote] The webserver will deny you the ability to login after a very small number of failed attempts. [/quote] Ok, but HTTP proxies are a hell of a lot eaiser to find than proxies that will work on Battle.net. | May 16, 2005, 10:16 PM |
iago | The 26mb wordlist comes with Knoppix-STD. Auditor comes with a 13-mb English list, as well as lists for every other language including joke languages (like Yiddish), movie names, zipcodes, people's names, etc. Auditor also has a pretty exhaustive list of default passwords on networking gear (routers, etc.) which is pretty handy. | May 16, 2005, 11:34 PM |
Yegg | Actually it isn't that much of a genius idea. Killer~Rival thought of the exact same thing over a year ago. of course he didn't know how he would do any of the brute forcing. He just thought that it would be simple to continuously attempt to login to an account through the website, considering you won't become ipbanned.[quote author=I_Smell_Tuna link=topic=11591.msg112597#msg112597 date=1116203249] Genius. [/quote] Are you sure Battle.net's webserver actually denies your request to login after a certain amount of tries? | May 17, 2005, 2:52 AM |
Tuberload | [quote author=Yegg link=topic=11591.msg112690#msg112690 date=1116298349] Actually it isn't that much of a genius idea. Killer~Rival thought of the exact same thing over a year ago. of course he didn't know how he would do any of the brute forcing. He just thought that it would be simple to continuously attempt to login to an account through the website, considering you won't become ipbanned.[quote author=I_Smell_Tuna link=topic=11591.msg112597#msg112597 date=1116203249] Genius. [/quote] Are you sure Battle.net's webserver actually denies your request to login after a certain amount of tries? [/quote] A properly configured server of any kind should denial access after a pre-determined amount of failures. | May 17, 2005, 3:06 AM |
Arta | lol, that's a big leap. Just because it's a good idea doesn't mean people will do it. | May 17, 2005, 3:11 PM |
Tuberload | [quote author=Arta[vL] link=topic=11591.msg112721#msg112721 date=1116342668] lol, that's a big leap. Just because it's a good idea doesn't mean people will do it. [/quote] I stated what should be an obvious answer; I am not trying to make any big leaps. Just because people might not do it, I should not state a good idea? | May 17, 2005, 6:47 PM |
Ban | After testing it seems that Tuberload is indeed correct (try putting in bogus info for a few logins then try a real login, no go.) | May 17, 2005, 7:59 PM |
QwertyMonster | Also: Attempting to create an account and it exists, or invalid password : 10 times will result in not able to log onto a valid password account. It seems it disables the cdkey for a while. I swapped CDKEYS and it worked fine. Interesting. :P | May 17, 2005, 8:16 PM |
LoRd | [quote author=Ban link=topic=11591.msg112747#msg112747 date=1116359991] After testing it seems that Tuberload is indeed correct (try putting in bogus info for a few logins then try a real login, no go.) [/quote] *LoRd[nK] | May 17, 2005, 8:23 PM |
JoeTheOdd | [quote author=LoRd[nK] link=topic=11591.msg112749#msg112749 date=1116361436] [quote author=Ban link=topic=11591.msg112747#msg112747 date=1116359991] After testing it seems that Tuberload is indeed correct (try putting in bogus info for a few logins then try a real login, no go.) [/quote] *LoRd[nK] [/quote] *Joe[x86] | May 17, 2005, 9:56 PM |
LoRd | no | May 17, 2005, 10:37 PM |
Ban | [quote author=Tuberload link=topic=11591.msg112694#msg112694 date=1116299162] [quote author=Yegg link=topic=11591.msg112690#msg112690 date=1116298349] Actually it isn't that much of a genius idea. Killer~Rival thought of the exact same thing over a year ago. of course he didn't know how he would do any of the brute forcing. He just thought that it would be simple to continuously attempt to login to an account through the website, considering you won't become ipbanned.[quote author=I_Smell_Tuna link=topic=11591.msg112597#msg112597 date=1116203249] Genius. [/quote] Are you sure Battle.net's webserver actually denies your request to login after a certain amount of tries? [/quote] A properly configured server of any kind should denial access after a pre-determined amount of failures. [/quote] [quote] *Lord[nK] [/quote] I said Tuberload! | May 18, 2005, 2:36 PM |