Re: Generate passwords by bruteforce

From: Rodrigo Montoro (Sp0oKeR) (spooker@gmail.com)
Date: Mon Jan 07 2008 - 13:51:18 EST


Try wyd from remote-exploit
http://www.remote-exploit.org/codes_wyd.html

Regards,
Rodrigo Montoro (Sp0oKeR)

On Jan 3, 2008 7:43 PM, Jones, David H <Jones.David.H@principal.com> wrote:> What do you want it to do? Write out to a file? If that's what you> want, you could write a little script in perl, php, python (whatever> your favorite language is) to generate it for you.>> However, that's going to be one huge file. If you just used one subset,> say A-Z, and 8 characters long, that's going to be 26 to the 8th, or a> total of 208,827,064,576 combinations.>> If you wanted to do limited special characters (lets say the characters> above the number keys, !@#$%^&*() ), you'd be looking at 62^8th, or> 218,340,105,584,896 combinations. That's over 218 *trillion*> combinations. If you used *all* special characters, that's about 82^8.> Figure that one out for yourself.>> -----Original Message-----> From: listbounce@securityfocus.com [mailto:listbounce@securityfocus.com]> On Behalf Of Rajesh A.> Sent: Tuesday, January 01, 2008 3:23 AM> To: pen-test@securityfocus.com> Subject: Generate passwords by bruteforce>>> Hi,> I n
eed a tool to generate passwords which contains all passwords with> all characters(A-Z,a-z,0-9 & Special chars). with specified number of> chars.>> Thank you in advance.> F.H.>>>>> ------------------------------------------------------------------------> This list is sponsored by: Cenzic>> Need to secure your web apps NOW?> Cenzic finds more, "real" vulnerabilities fast.> Click to try it, buy it or download a solution FREE today!>> http://www.cenzic.com/downloads> ------------------------------------------------------------------------>>> -----Message Disclaimer----->> This e-mail message is intended only for the use of the individual or> entity to which it is addressed, and may contain information that is> privileged, confidential and exempt from disclosure under applicable law.> If you are not the intended recipient, any dissemination, distribution or> copying of this communication is strictly prohibited. If you have> received this communication in error, please notify us immediately by> reply email to Co
nnect@principal.com and delete or destroy all copies of> the original message and attachments thereto. Email sent to or from the> Principal Financial Group or any of its member companies may be retained> as required by law or regulation.>> Nothing in this message is intended to constitute an Electronic signature> for purposes of the Uniform Electronic Transactions Act (UETA) or the> Electronic Signatures in Global and National Commerce Act ("E-Sign")> unless a specific statement to the contrary is included in this message.>> While this communication may be used to promote or market a transaction> or an idea that is discussed in the publication, it is intended to provide> general information about the subject matter covered and is provided with> the understanding that The Principal is not rendering legal, accounting,> or tax advice. It is not a marketed opinion and may not be used to avoid> penalties under the Internal Revenue Code. You should consult with> appropriate counsel or other advisors on all matters
 pertaining to legal,> tax, or accounting obligations and requirements.>>> ------------------------------------------------------------------------> This list is sponsored by: Cenzic>> Need to secure your web apps NOW?> Cenzic finds more, "real" vulnerabilities fast.> Click to try it, buy it or download a solution FREE today!>> http://www.cenzic.com/downloads> ------------------------------------------------------------------------>>

-- ========================= Rodrigo Ribeiro Montoro Analista de Segurança SnortCP / RHCE / LPIC-I http://spookerlabs.multiply.com=========================



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:58:19 EDT