hacking progs

Gooberlx2

Lifer
May 4, 2001
15,381
6
91
can anyone point me to some sort of packet sniffing program and/or password cracking prog. I wanna test some machines/servers on my LAN.
 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0
ethereal and tcpdump/windump are a couple of the best free sniffers out there. What kind of passwords do you want to crack? And do you have permission to do this?
 

Gooberlx2

Lifer
May 4, 2001
15,381
6
91
Originally posted by: n0cmonkey
ethereal and tcpdump/windump are a couple of the best free sniffers out there. What kind of passwords do you want to crack? And do you have permission to do this?

Yeah, these are my own machines. I'm just testing things out like admin passwords, shares (linux and windows), vnc, etc. I swear I'm not doing anything nefarious. :Q :D.
 

MainFramed

Diamond Member
May 29, 2002
5,981
1
0
you use vnc? how do you like it....i am intrested in knowing how the password crack check on that one will wurk out.
 

Descartes

Lifer
Oct 10, 1999
13,968
2
0
I've written my own programs to do this very thing. I have 3 that I use that do the following:

- Ping sweep for hosts on the local network to which you're attached
- Enumerate accounts/shares/locate sid 500 for admin account (for NT hosts) of NetBIOS supported hosts
- If desired, perform a dictionary attack of the shares

I enumerate the hosts by way of the ipc$ share. I also have an application that I've written which exploits html forms-based authentication; it does the following:

- Attempts a wide number of sql injection techniques to login
- If the above fails, it will perform a dictionary attack by sending http get/post requests using the username/password fields extrapolated from the html login form.

I extended it to work w/ HTTP basic authentication but ran into problems. Finally, I have another that works with standard windows applications using login mechanisms that indicate to the user whether login succeeded/failed. It does the following:

- Performs a dictionary attack against the login form by doing a SendMessage() to each respective textbox for the username and password. It'll press the command-button and look for either a label indicating failure, or a window indicating failure. If either is present, it assumes failure and tries again. This isn't a very general app as I often have to change/recompile depending on the target application.

I have all of the above in source form if you're interesting in seeing them. I will not distribute them in binary form. I call them wnetbrute, webrute, and winbrute, respectively. They're written in either C, C#, or Java; some all 3. They're just brute forcing apps, there's no intelligence to them. I have other tools for that...

n0cMonkey's suggestion was about the best; ethereal is probably the best (free) sniffer I've used, and it supports the same filtering syntax as tcpdump. Also, if you're wanting to do vulnerability scans, look at nessus. Next, look at nmap. You could write a simple script which launched nmap to do a ping sweep and os ident, write that to an xml file, and translate that xml file into a format that you could feed into nessus. The result is an entirely automated scan of only valid hosts...

I hope the above information wasn't entirely useless.
 

MainFramed

Diamond Member
May 29, 2002
5,981
1
0
where can we get those programs that you have...made w/ c c# a java....or cant we..?
 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0
Originally posted by: Descartes
You could write a simple script which launched nmap to do a ping sweep and os ident, write that to an xml file, and translate that xml file into a format that you could feed into nessus. The result is an entirely automated scan of only valid hosts...

I hope the above information wasn't entirely useless.

What do you mean by valid?
 

Descartes

Lifer
Oct 10, 1999
13,968
2
0
Originally posted by: n0cmonkey
Originally posted by: Descartes
You could write a simple script which launched nmap to do a ping sweep and os ident, write that to an xml file, and translate that xml file into a format that you could feed into nessus. The result is an entirely automated scan of only valid hosts...

I hope the above information wasn't entirely useless.

What do you mean by valid?

Those that responded to the icmp echo requests and can be deterministically scanned.

I understand that's not fool-proof, but those who are targeting specific hosts won't be ping sweeping anyway. I also use this same idea to attach myself to a network when a dhcp server is not available. I can simply ngrep for a host, discern it's netmask, ping sweep that segment, and assign myself an ip for the first one that doesn't respond. Again, not fool-proof, but it works.

 

Descartes

Lifer
Oct 10, 1999
13,968
2
0
Originally posted by: here4amission
where can we get those programs that you have...made w/ c c# a java....or cant we..?

I can email them to you if you like. I wrote them all in C# w/ the exception of two lesser versions in C and Java. The Java version is just a JNI layer over the exported functions from the library written in C.
 

Gooberlx2

Lifer
May 4, 2001
15,381
6
91
Originally posted by: here4amission
you use vnc? how do you like it....i am intrested in knowing how the password crack check on that one will wurk out.

I like it very much. It works rather well. I don't think there really isn't any security on VNC, so hopefully the passwords I used aren't too easy. I'm just testing things 'cause "I want to know more" (Starship Trooper style ;) ).