Bruter is a parallel network login brute-forcer on Win32. This tool is intended to demonstrate the importance of choosing strong passwords. The goal of Bruter is to support a variety of services that allow remote authentication.
Download: http://sourceforge.net/projects/worawita
Bruter version 1.0
May 3, 2010
0 Comments
Explore More
What are the various Trojan vectors?
A Trojan may infect any system through Trojan vectors. The most common Trojan vectors are as follows: * Email attachments * Social engineering * NetBIOS remote installation * Physical access
Critical SQL Injection in The Venerable Mahasi Sayadaw’s Website
PlanetCreator has reported another critical SQL Injection (vulnerability) on The Venerable Mahasi Sayadaw’s Website http://www.mahasi.org.mm SQL injection is a code injection technique that exploits a security vulnerability occurring in the
Error Messages
Error Messages Overview Think about these questions. * Why are Error Conditions and Error Messages a security problem? * What’s wrong with error conditions? * Wouldn’t an administrator want the
