Exploit-DB updates

Friday, January 7, 2011

Medusa Bruteforcer

Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application:
  • Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.
  • Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.
  • Modular design. Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing. 
This tool could be used with one of the dictionaries I posted to test the security of your password, or by someone trying to bruteforce into your SSH for example. This is just another reason as to why you should choose a very secure password like S0meP4ss[1984] or something of the like. This way you don't have to worry about hackers trying to bruteforce your logins.

Example usage for bruteforcing SSH;
medusa -h IP Address -u username -P dictionary -O logfile -protocol

medusa -h 88.213.43.13 -u root -P /home/Desktop/dictionary.txt -O mlog -M ssh

    No comments:

    Post a Comment