Re: Brute-forcing Dial-up password after war-dial

From: Tomas Nybrand (nybrand@home.se)
Date: Tue Sep 23 2003 - 12:46:12 EDT


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Thursday 18 September 2003 17.55, Michelangelo Sidagni wrote:
> After a war dial, I obtained a list of phone numbers that responded with a
> carrier (PPP or other). Is there a free tool out there that bruteforce
> Dial-up ID and passwords on the numbers identified by the war dial? I know
> that PhoneSweep does that, but is there a workaround / free program to do
> that?
>
> Thanks
>
> Mike

Hi

Have you looked at THC:s tool "THC-Dialup Login Hacker" ?
You can find it under thc/releases
( http://www.thc.org/download.php?t=r&d=login_hacker-1.1.tar.gz )

Good luck!

- --
mvh/ Tomas Nybrand

- - Bene qui latuit, bene vixit. -

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8

iQA+AwUBP3B422Sny2W4kBZqEQIqNACYqu5szb9+AfkU6cBEkqb8W62bWACg/h1a
ELdy2WiIyxjdS362NPtvKfw=
=+Jdf
-----END PGP SIGNATURE-----

---------------------------------------------------------------------------
----------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:40 EDT