Bruter is a parallel network login brute-forcer on Win32. This tool is intended to demonstrate the importance of choosing strong passwords. The goal of Bruter is to support a variety of services that allow remote authentication.
Download: http://sourceforge.net/projects/worawita
Bruter version 1.0
May 3, 2010
0 Comments
Explore More
What are the various steps in the pre-attack phase?
In the pre-attack phase, there are seven steps, which have been defined by the EC-Council, as follows: 1. Information gathering 2. Determining network range 3. Identifying active machines 4. Finding
Critical SQL Injection in www.kmd.com KMD Group of Companies
PlanetCreator.Net’s Security Team Member Info Freakzz <infofreakzzz(at)gmail.com> has reported another critical SQL Injection (vulnerability) on http://www.kmd.com.sg owned by KMD Group of Companies These are some information from Vulneral Site http://www.kmd.com.sg
EtterCap – ARP Spoofing And Beyond
When it comes to Network Security, my philosophy is – “You can’t afford to know less than the Hacker.” This means that in order to protect ourselves effectively, we need
