Book Image

Learning zANTI2 for Android Pentesting

By : Miroslav Vitula
Book Image

Learning zANTI2 for Android Pentesting

By: Miroslav Vitula

Overview of this book

Table of Contents (12 chapters)

Brute-force scripts


These scripts simply perform a brute-force attack, usually to find out login credentials, against servers, databases, services, protocols, just about anything that could potentially give you any spicy information. Thus, they are all intrusive and kicking. Have a look at the list:

  • Backorifice-brute: This script performs a brute-force attack on the Back Orifice service. Back Orifice is a computer program designed for remote system administration. In short, it lets a user control a computer running Windows OS from a remote location. It's old but it works.

  • Cassandra-brute: This does the same thing, brute forcing—this time the Cassandra database. Cassandra is a very reliable database management system designed to handle large amounts of data, with the lowest possible amount of fails.

  • Metasploit-msgrpc-brute: This performs an attack against the Metasploit msgrpc interface. (Metasploit, for those that don't know, is one of the most complete, best known penetration software for...