MIG33 BATURETNO

ayo pada gabung temen temen
 
HomePortalSearchRegisterLog in

Share
 

 ZX-81 PASWORD CRACKER

Go down 
AuthorMessage
axcela

axcela

Posts : 74
Join date : 2009-04-08
Age : 33
Location : baturetno

ZX-81 PASWORD CRACKER Empty
PostSubject: ZX-81 PASWORD CRACKER   ZX-81 PASWORD CRACKER EmptyThu Apr 09, 2009 9:38 pm

ZX-81 PASWORD CRACKER Zx81mpccc5
OK guys and gals... Here is a "Proof of Concept" which means it will work, but requires time and faith... Smile

To
tell you guys things a bit easier for you all to understand... This is
a "mig33 password cracker"... a brute force cracker only using
specified word list... meaning it's has very basic algorithm... that
doesn't check all the combinations of A-Z and 0-9...

Before you
guys start using this or if anyone actually uses this... just remember
that after 5 incorrect passwords for a specific username, mig33 server
does a "Time-out", basically what it does is that... the server does
not sends us any message that the password is incorrect if the password
is incorrect, and also if the password is correct it takes a little
more time than usual... And the duration of the time-out is
unlimited... :s, which is the reason for the slow down...

There
are two word list files with the package... "passwords.txt" is the file
that the program reads, and the other one is just "more_words.txt"
which includes more than a million words... So if anyone wants to read
another file then you'll have to rename that file to "passwords.txt"

Just
remember that this is a "Proof of Concept", but Yes if the password is
in the list (which is rare), the password will get cracked...

So
i suppose if anyone want to use this, just load a word list, enter a
username and execute "crack password" command... and take a long nap...

LINK:DOWNLOAD
jocolor
ZX-81 PASWORD CRACKER Admin10
Back to top Go down
http://axcela.peperonity.com
 
ZX-81 PASWORD CRACKER
Back to top 
Page 1 of 1

Permissions in this forum:You cannot reply to topics in this forum
MIG33 BATURETNO :: MIG33 REPORTAGE :: SOFTWARE-
Jump to: