Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.
Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations.
On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase.
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
Currently it supports the following modules:
* ftp_login : Brute-force FTP
* ssh_login : Brute-force SSH
* telnet_login : Brute-force Telnet
* smtp_login : Brute-force SMTP
* smtp_vrfy : Enumerate valid users using the SMTP VRFY command
* smtp_rcpt : Enumerate valid users using the SMTP RCPT TO command
* http_fuzz : Brute-force HTTP/HTTPS
* pop_passd : Brute-force poppassd (not POP3)
* ldap_login : Brute-force LDAP
* smb_login : Brute-force SMB
* mssql_login : Brute-force MSSQL
* oracle_login : Brute-force Oracle
* mysql_login : Brute-force MySQL
* pgsql_login : Brute-force PostgreSQL
* vnc_login : Brute-force VNC
* dns_forward : Forward lookup subdomains
* dns_reverse : Reverse lookup subnets
* snmp_login : Brute-force SNMPv1/2 and SNMPv3
* unzip_pass : Brute-force the password of encrypted ZIP files
* keystore_pass : Brute-force the password of Java keystore files
The name "Patator" comes from http://www.youtube.com/watch?v=xoBkBvnTTjo
Patator is NOT script-kiddie friendly, please read the README inside patator.py before reporting.
HexorBase is a database application designed for administering and auditing multiple database servers simultaneously from a centralized location, it is capable of performing SQL queries and bruteforce attacks against common database servers (MySQL, SQLite, Microsoft SQL Server, Oracle, PostgreSQL ).HexorBase allows packet routing through proxies or even metasploit pivoting antics to communicate with remotely inaccessible servers which are hidden within local subnets. It works on Linux and Windows.
[cc lang="bash"]dpkg -i hexorbase_1.0_all.deb [/cc]
Icon "HexorBase.desktop"can be found at /usr/share/applications for KDE and also GNOME
Badass is a pack of tools to mess with systems and networks. It's a helping program for lammers, skiddies, and various other peoples with no computer skills at all. Programmed in Ruby/Perl/Python and oriented to GNU/Linux Debian, Ubuntu, Backtrack systems and their derivatives. It is free, licensed under GNU/GPLv3.
If you want to report errors, give feedback and new code or ideas, contact the author blass[at]sdf [d0t] lonestar [d0t] org
* Decryption/Encryption Tools
Base64 Encoder & Decoder
Multi-Digest (MD5, SHA1, SHA256, SHA384, SHA512, RIPEMD-160)
Hash Password Cracker (MD5, SHA1, SHA256, SHA384, SHA512, RIPEMD-160)
* Network Tools
TCP port scanner
DNS and host gathering
Admin login page finder
* Badass ToolBox
do this first:
[cc lang="bash"]apt-get install hping3 nmap tcpdump wapiti[/cc]
[cc lang="bash"]gem install net-ssh
gem install optiflag
gem install net-http[/cc]
[cc lang="bash"]ruby badass.rb [/cc]
And the author mentions something about install errors / usage:
"In the file (badass.rb) you have some configuration lines to mess with.
Look at it, if you have problems or you want to change something. Again you are on your own.
If you don't understand something or you have questions, this mean you are stupid and
I DON'T CARE!"