Re: Brute-forcing Dial-up password after war-dial

From: noconflic (nocon@texas-shooters.com)
Date: Fri Sep 19 2003 - 15:11:45 EDT


[m.sidagni@verizon.net] Thu, Sep 18, 2003 at 03:55:02PM -0000 wrote:
>
>
> After a war dial, I obtained a list of phone numbers that responded with a carrier (PPP or other). Is there a free tool out there that bruteforce Dial-up ID and passwords on the numbers identified by the war dial? I know that PhoneSweep does that, but is there a workaround / free program to do that?
>
> Thanks
>
> Mike

  Just of the top of my head.

  If you have a linux box with PPP set up on it you could just write a simple
  script that modifies the ppp-on scripts $ACCOUNT & $PASSWORD pairs from a
  text file(s) containing usernames and passwords. I am sure there are programs
  out there, but i didn't really look very hard either. :)

  Hope this helps

- nocon

---------------------------------------------------------------------------
----------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:40 EDT