[TOOL] QCrack - Message Diggest Brute Force Tool

From: SecuriTeam (support_at_securiteam.com)
Date: 10/26/05

  • Next message: SecuriTeam: "[UNIX] Linux Orinoco Drivers Information Leakage"
    To: list@securiteam.com
    Date: 26 Oct 2005 19:34:43 +0200
    
    

    The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
    - - promotion

    The SecuriTeam alerts list - Free, Accurate, Independent.

    Get your security news from a reliable source.
    http://www.securiteam.com/mailinglist.html

    - - - - - - - - -

      QCrack - Message Diggest Brute Force Tool
    ------------------------------------------------------------------------

    SUMMARY

    DETAILS

    QCrack is a program written to test the security of md5,md4,md2 passwords
    by attempting to brute force them. The user can also specify the
    characters to use when brute-forcing.

    The tool is command line based for the Linux platform. QCrack requires the
    open ssl libraries. The tool can perform either a bruteforce attack on a
    known hash, or calculate the hash of a given string.

    The tool can be downloaded from: <http://www.0x11.org/projects/>
    http://www.0x11.org/projects/

    ADDITIONAL INFORMATION

    The information has been provided by <mailto:qnix@bsdmail.org> Q nix.
    To keep updated with the tool visit the project's homepage at:
    <http://www.0x11.org/projects/> http://www.0x11.org/projects/

    ========================================

    This bulletin is sent to members of the SecuriTeam mailing list.
    To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
    In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

    ====================
    ====================

    DISCLAIMER:
    The information in this bulletin is provided "AS IS" without warranty of any kind.
    In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.


  • Next message: SecuriTeam: "[UNIX] Linux Orinoco Drivers Information Leakage"

    Relevant Pages

    • [NT] Windows 2000/2003 SYN DoS Attack Protection
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Windows 2000/2003 SYN DoS Attack Protection ... The vulnerability resides in the hash table management, ...
      (Securiteam)
    • [NEWS] Default Configuration Information Disclosure in Lotus Domino (Including Password Hashes)
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... * Lotus Domino R5 WebMail ... hidden field called "HTTPPassword" which contains the password hash. ... Vendor response stating that they couldn't find a way to ...
      (Securiteam)
    • [EXPL] phpBB Remote PHP Code Execution (viewtopic.php 2)
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... The following exploit code utilizes a vulnerability in phpBB to cause ... This bulletin is sent to members of the SecuriTeam mailing list. ... In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. ...
      (Securiteam)
    • [EXPL] TinyWeb Server DoS Exploit
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... The information in this bulletin is provided "AS IS" without warranty of any kind. ... In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. ...
      (Securiteam)
    • [EXPL] 3Com FTP Server Buffer Overflow (CD)
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... overflow in its parsing of the 'CD' command. ... The information in this bulletin is provided "AS IS" without warranty of any kind. ... In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. ...
      (Securiteam)