exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ftpcrack.htm

ftpcrack.htm
Posted Aug 17, 1999

FTP login cracking utility.

SHA-256 | 8675695a93a1ce62a76a370ac9569f4fe911acc8bd800c338eefb8c3554b23a5

ftpcrack.htm

Change Mirror Download
<HTML>
<HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=windows-1252">
<META NAME="Generator" CONTENT="Microsoft Word 97">
<TITLE>Ftpcrack</TITLE>
</HEAD>
<BODY BGCOLOR="#ffffff" LINK="#0000ff">

<B><P ALIGN="CENTER">Ftpcrack.pl</P>
</B><P ALIGN="CENTER">&nbsp;</P>
<P>This is a good one! Ftpcrack.pl will connect to an ftp site and then test the Administrator account with a list of passwords that are read from a text file (cracknt.txt). To be more precise ftpcrack.pl will run the ftp client software using the –n opti
on (suppress auto login) and the –s option. The –s option tells the ftp client to run the commands stored in a text file. In this case the command is:</P>
<P>&nbsp;</P>
<B><P>user administrator</B> *<B>password</P>
</B><P>&nbsp;</P>
<P>The line in the perl script, actually the <B>only</B> line in the script, that does this is :</P>
<P>&nbsp;</P>
<B><P>system (‘ftp –n –s:cracknt.txt 127.0.0.1 > cracked.txt’);</P>
</B><P>&nbsp;</P>
<P>(Copy this line to notepad and save as ftpcrack.pl)</P>
<P>Note the " > cracked.txt" at the end. This redirects the output to a text file cracked.txt. You then open up cracked.txt to see if you have cracked the admin password. This relies on two things:</P>
<P>&nbsp;</P>
<OL>

<LI>The Administrator has a weak password. One that is listed in the cracknt.txt file.</LI>
<LI>The ftp service isn’t configured to allow only anonymous connections.</LI></OL>

<P>&nbsp;</P>
<P>The beauty of this one is it can be run remotely : Lets say you have cracked an NT Internet Information Server and have admin rights on it. You can copy this script to that server, using Explorer and put it in the following directory : c:\inetpub\scrip
ts or equivalent. It has to go in a www directory that has the ‘execute’ permission enabled. You could also try c:\inetpub\ASPSamp\AdvWorks or if they have it c:\inetpub\cgi-bin. Once you have copied it there you can run it via your web browser. This mean
s you are using up their bandwidth and <B>not running up your phone-bill! </B>To run it remotely enter the following URL in your browser :</P>
<P>&nbsp;</P>
<FONT SIZE=2><P></FONT><A HREF="http://www.company.com/scripts/ftpcrack.pl">http://www.company.com/scripts/ftpcrack.pl</A></P>
<P>&nbsp;</P>
<P>After you run it make sure you edit the log file to hide the fact that you were the one who run it. If you don’t do this at least go through a couple of proxy servers. (To find out how to do this read my IP FYI)</P>
<P>&nbsp;</P>
<P>Before you upload ftpcrack.pl to the server though edit the IP address in the following line changing it to the IP address of the machine you want to crack.</P>
<P>&nbsp;</P>
<P>system (‘ftp –n –s:cracknt.txt 127.0.0.1 > cracked.txt’);</P>
<P>&nbsp;</P>
<P>You’ll also need to upload cracknt.txt and put it in the same directory.</P>
<P>Once all that passwords in cracknt.txt have been tested connect to the site using Windows Explorer and open up cracked.txt. Note – You won’t be able to get to this file using the web because the /scripts directory should deny the ‘read’ permission. Onc
e you have cracked.txt, using notepad do a search on "logged" because if you get the password you’ll get a message "user administrator logged in."</P>
<P>&nbsp;</P>
<B><P>Note – This will fill up the target machine’s System event log with messages about bad user names or passwords. Also the ftp logfile will show this activity if ftp logging is enabled. If you are running it remotely though the remote machine’s IP add
ress will be logged and not yours.<HR>2nd Note - because the target server will time out the connection after 900 seconds if no valid login has occurred you may have to break the password file up into chunks and run it in batches.</P>
<P>&nbsp;</P>
<P>For a zipped version of cracknt.txt <A HREF="cracknt.zip">click here.</a></P></B>
</BODY>
</HTML>
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close