Jump to content

Search the Community

Showing results for tags 'brute-force'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 4 results

  1. Hi Im trying to use the nmap script http-default-accounts with this command : nmap -d2 -sV --script=http-default-accounts 192.168.0.1 The default fingerprint lua file contains the default password admin and user admin for my cisco router. but the output does not say anything about it. The debug output shows that the default credentials do get checked, but then I get an ssl error on port 80. What am I doing wrong? Debug ouput: npcap service is already running. wpcap.dll present, library version: Npcap version 0.9986, based on libpcap version 1.9.1 Starting Nma
  2. After 3 months of work I've released version 0.1 of Abrute. Abrute is a Multi-threaded AES brute force file decryption tool. It has much of the same character sequencer support that the crunch tool does. I've spent a good portion of my development time discovering and implementing sequence algorithms to shave off as many wasted CPU cycles as I can and I feel pretty good about it. The beauty of it is that it works. Now the computers I own only have 4 cores so I'm limited in the amount of processing power to get work loads done. I can say that with a finite amount of cores the workload
  3. Let's see if I can adequately describe what I need help with here. I'm trying to shift the lines of a txt file do meet my required output. I'm trying to create a list of numbers to brute force a lock (that I own). This lock will ignore everything leading up to the correct pin. for example, if the pin is 1234 and enter 46541198751234 and it will unlock. In my research, I have discovered the De Bruijn sequence (https://en.wikipedia.org/wiki/De_Bruijn_sequence) which will allow me to quickly go through all possible PINs in a very efficient manner without having to enter each option indivi
  4. Hi, I purchased mSecure for Android. Now I don't own an Android device anymore and I want to import my msecurebackupfile to mSecure for windows. But I'm an idiot and i forgot my password. I remember the first 12 letters but I remember that I once thought "12 letters is not enough" and put 3 or 4 letters more. Now I'm looking for a way to brute-force it. when msecure for windows starts, you can enter the password, hit Return and if it is wrong then you can enter again, don't have to click an okay button. I hope anyone can help me ! Regards
×
×
  • Create New...