diff --git a/README.md b/README.md index ce4c247..ccd30cb 100644 --- a/README.md +++ b/README.md @@ -1,7 +1,8 @@ -Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage. +Patator was written out of frustration from using Hydra, Medusa, Ncrack, Metasploit modules and Nmap NSE scripts for password guessing attacks. I opted for a different approach in order to not create yet another brute-forcing tool and avoid repeating the same shortcomings. Patator is a multi-threaded tool written in Python, that strives to be more reliable and flexible than his fellow predecessors. Currently it supports the following modules: +``` * ftp_login : Brute-force FTP * ssh_login : Brute-force SSH * telnet_login : Brute-force Telnet @@ -30,6 +31,7 @@ Currently it supports the following modules: * unzip_pass : Brute-force the password of encrypted ZIP files * keystore_pass : Brute-force the password of Java keystore files * umbraco_crack : Crack Umbraco HMAC-SHA1 password hashes +``` The name "Patator" comes from http://www.youtube.com/watch?v=xoBkBvnTTjo diff --git a/patator.py b/patator.py index d63f527..09a2fb2 100755 --- a/patator.py +++ b/patator.py @@ -31,36 +31,36 @@ INTRODUCTION Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage. Currently it supports the following modules: - - ftp_login : Brute-force FTP - - ssh_login : Brute-force SSH - - telnet_login : Brute-force Telnet - - smtp_login : Brute-force SMTP - - smtp_vrfy : Enumerate valid users using the SMTP 'VRFY' command - - smtp_rcpt : Enumerate valid users using the SMTP 'RCPT TO' command - - finger_lookup : Enumerate valid users using Finger - - http_fuzz : Brute-force HTTP - - pop_login : Brute-force POP3 - - pop_passd : Brute-force poppassd (http://netwinsite.com/poppassd/) - - imap_login : Brute-force IMAP4 - - ldap_login : Brute-force LDAP - - smb_login : Brute-force SMB - - smb_lookupsid : Brute-force SMB SID-lookup - - vmauthd_login : Brute-force VMware Authentication Daemon - - mssql_login : Brute-force MSSQL - - oracle_login : Brute-force Oracle - - mysql_login : Brute-force MySQL - - mysql_queries : Brute-force MySQL queries - - pgsql_login : Brute-force PostgreSQL - - vnc_login : Brute-force VNC - - - dns_forward : Brute-force DNS - - dns_reverse : Brute-force DNS (reverse lookup subnets) - - snmp_login : Brute-force SNMPv1/2 and SNMPv3 - - - unzip_pass : Brute-force the password of encrypted ZIP files - - keystore_pass : Brute-force the password of Java keystore files - - - tcp_fuzz : Fuzz TCP services + + ftp_login : Brute-force FTP + + ssh_login : Brute-force SSH + + telnet_login : Brute-force Telnet + + smtp_login : Brute-force SMTP + + smtp_vrfy : Enumerate valid users using SMTP VRFY + + smtp_rcpt : Enumerate valid users using SMTP RCPT TO + + finger_lookup : Enumerate valid users using Finger + + http_fuzz : Brute-force HTTP + + pop_login : Brute-force POP3 + + pop_passd : Brute-force poppassd (http://netwinsite.com/poppassd/) + + imap_login : Brute-force IMAP4 + + ldap_login : Brute-force LDAP + + smb_login : Brute-force SMB + + smb_lookupsid : Brute-force SMB SID-lookup + + rlogin_login : Brute-force rlogin + + vmauthd_login : Brute-force VMware Authentication Daemon + + mssql_login : Brute-force MSSQL + + oracle_login : Brute-force Oracle + + mysql_login : Brute-force MySQL + + mysql_query : Brute-force MySQL queries + + pgsql_login : Brute-force PostgreSQL + + vnc_login : Brute-force VNC + + dns_forward : Forward DNS lookup + + dns_reverse : Reverse DNS lookup + + snmp_login : Brute-force SNMP v1/2/3 + + unzip_pass : Brute-force the password of encrypted ZIP files + + keystore_pass : Brute-force the password of Java keystore files + + umbraco_crack : Crack Umbraco HMAC-SHA1 password hashes + + tcp_fuzz : Fuzz TCP services + + dummy_test : Testing module Future modules to be implemented: - rdp_login @@ -3686,7 +3686,7 @@ class Controller_DNS(Controller): class DNS_reverse: - '''Reverse lookup subnets''' + '''Reverse DNS lookup''' usage_hints = [ """%prog host=NET0 0=192.168.0.0/24 -x ignore:code=3""", @@ -3720,7 +3720,7 @@ class DNS_reverse: return resp class DNS_forward: - '''Forward lookup names''' + '''Forward DNS lookup''' usage_hints = [ """%prog name=FILE0.google.com 0=names.txt -x ignore:code=3""",