updated doc

pull/4/merge
lanjelot 10 years ago
parent d09d1176aa
commit 7ccbc20371

@ -1,7 +1,8 @@
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage. Patator was written out of frustration from using Hydra, Medusa, Ncrack, Metasploit modules and Nmap NSE scripts for password guessing attacks. I opted for a different approach in order to not create yet another brute-forcing tool and avoid repeating the same shortcomings. Patator is a multi-threaded tool written in Python, that strives to be more reliable and flexible than his fellow predecessors.
Currently it supports the following modules: Currently it supports the following modules:
```
* ftp_login : Brute-force FTP * ftp_login : Brute-force FTP
* ssh_login : Brute-force SSH * ssh_login : Brute-force SSH
* telnet_login : Brute-force Telnet * telnet_login : Brute-force Telnet
@ -30,6 +31,7 @@ Currently it supports the following modules:
* unzip_pass : Brute-force the password of encrypted ZIP files * unzip_pass : Brute-force the password of encrypted ZIP files
* keystore_pass : Brute-force the password of Java keystore files * keystore_pass : Brute-force the password of Java keystore files
* umbraco_crack : Crack Umbraco HMAC-SHA1 password hashes * umbraco_crack : Crack Umbraco HMAC-SHA1 password hashes
```
The name "Patator" comes from http://www.youtube.com/watch?v=xoBkBvnTTjo The name "Patator" comes from http://www.youtube.com/watch?v=xoBkBvnTTjo

@ -31,36 +31,36 @@ INTRODUCTION
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage. Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
Currently it supports the following modules: Currently it supports the following modules:
- ftp_login : Brute-force FTP + ftp_login : Brute-force FTP
- ssh_login : Brute-force SSH + ssh_login : Brute-force SSH
- telnet_login : Brute-force Telnet + telnet_login : Brute-force Telnet
- smtp_login : Brute-force SMTP + smtp_login : Brute-force SMTP
- smtp_vrfy : Enumerate valid users using the SMTP 'VRFY' command + smtp_vrfy : Enumerate valid users using SMTP VRFY
- smtp_rcpt : Enumerate valid users using the SMTP 'RCPT TO' command + smtp_rcpt : Enumerate valid users using SMTP RCPT TO
- finger_lookup : Enumerate valid users using Finger + finger_lookup : Enumerate valid users using Finger
- http_fuzz : Brute-force HTTP + http_fuzz : Brute-force HTTP
- pop_login : Brute-force POP3 + pop_login : Brute-force POP3
- pop_passd : Brute-force poppassd (http://netwinsite.com/poppassd/) + pop_passd : Brute-force poppassd (http://netwinsite.com/poppassd/)
- imap_login : Brute-force IMAP4 + imap_login : Brute-force IMAP4
- ldap_login : Brute-force LDAP + ldap_login : Brute-force LDAP
- smb_login : Brute-force SMB + smb_login : Brute-force SMB
- smb_lookupsid : Brute-force SMB SID-lookup + smb_lookupsid : Brute-force SMB SID-lookup
- vmauthd_login : Brute-force VMware Authentication Daemon + rlogin_login : Brute-force rlogin
- mssql_login : Brute-force MSSQL + vmauthd_login : Brute-force VMware Authentication Daemon
- oracle_login : Brute-force Oracle + mssql_login : Brute-force MSSQL
- mysql_login : Brute-force MySQL + oracle_login : Brute-force Oracle
- mysql_queries : Brute-force MySQL queries + mysql_login : Brute-force MySQL
- pgsql_login : Brute-force PostgreSQL + mysql_query : Brute-force MySQL queries
- vnc_login : Brute-force VNC + pgsql_login : Brute-force PostgreSQL
+ vnc_login : Brute-force VNC
- dns_forward : Brute-force DNS + dns_forward : Forward DNS lookup
- dns_reverse : Brute-force DNS (reverse lookup subnets) + dns_reverse : Reverse DNS lookup
- snmp_login : Brute-force SNMPv1/2 and SNMPv3 + snmp_login : Brute-force SNMP v1/2/3
+ unzip_pass : Brute-force the password of encrypted ZIP files
- unzip_pass : Brute-force the password of encrypted ZIP files + keystore_pass : Brute-force the password of Java keystore files
- keystore_pass : Brute-force the password of Java keystore files + umbraco_crack : Crack Umbraco HMAC-SHA1 password hashes
+ tcp_fuzz : Fuzz TCP services
- tcp_fuzz : Fuzz TCP services + dummy_test : Testing module
Future modules to be implemented: Future modules to be implemented:
- rdp_login - rdp_login
@ -3686,7 +3686,7 @@ class Controller_DNS(Controller):
class DNS_reverse: class DNS_reverse:
'''Reverse lookup subnets''' '''Reverse DNS lookup'''
usage_hints = [ usage_hints = [
"""%prog host=NET0 0=192.168.0.0/24 -x ignore:code=3""", """%prog host=NET0 0=192.168.0.0/24 -x ignore:code=3""",
@ -3720,7 +3720,7 @@ class DNS_reverse:
return resp return resp
class DNS_forward: class DNS_forward:
'''Forward lookup names''' '''Forward DNS lookup'''
usage_hints = [ usage_hints = [
"""%prog name=FILE0.google.com 0=names.txt -x ignore:code=3""", """%prog name=FILE0.google.com 0=names.txt -x ignore:code=3""",

Loading…
Cancel
Save