Re: SSH version 2(!!) - brute forcer

From: Jamie (aouf77at_private)
Date: Tue Jun 17 2003 - 13:52:43 PDT

  • Next message: Manteuffel Tom: "RE: Noisy port scans"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    On Tuesday 17 June 2003 21:07, Kroma Pierre wrote:
    > Hi,
    >
    > I'm pentesting a ssh server version 2 and found with the timing bug a list
    > of valid users. Do you know a brute force tool/script, which can check a
    > ssh server, who only support ssh version 2?
    
    I think this is what you're looking for:
    
    	http://packetstormsecurity.com/groups/teso/guess-who-0.44.tgz
    
    - -jamie.
    
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.7 (GNU/Linux)
    
    iD8DBQE+73+o0oWsN6bx+R0RApQIAJ9G5ibMYvGVxc2qmY6YDC5pJq0bwQCfSZ9C
    fJ+z4EtiGY0Qg7rdma54hxA=
    =9Fz+
    -----END PGP SIGNATURE-----
    
    
    ---------------------------------------------------------------------------
    Attend the Black Hat Briefings & Training, July 28 - 31 in Las Vegas, the 
    world's premier technical IT security event! 10 tracks, 15 training sessions, 
    1,800 delegates from 30 nations including all of the top experts, from CSO's to 
    "underground" security specialists.  See for yourself what the buzz is about!  
    Early-bird registration ends July 3.  This event will sell out. www.blackhat.com
    ----------------------------------------------------------------------------
    



    This archive was generated by hypermail 2b30 : Tue Jun 17 2003 - 14:11:42 PDT