Bruter is a parallel network login brute-forcer on Win32. This tool is intended to demonstrate the importance of choosing strong passwords. The goal of Bruter is to support a variety of services that allow remote authentication.
Download: http://sourceforge.net/projects/worawita
Bruter version 1.0
May 3, 2010
0 Comments
Explore More
What are the components of a security evaluation?
Any security evaluation involves three components: * Preparation: In this phase, a formal contract is signed between an ethical hacker and the authority of the organization that contains a non-disclosure
You’ve Hired a Hacker (Section 5)
Section 5: What does that mean? 5.1: My hacker doesn’t speak English. At least, I don’t think so. Your hacker is a techie, and knows a number of powerful concepts
Complete MySQL Injection
Credit go to sam207 TABLE OF CONTENT: #INTRO #WHAT IS DATABASE? #WHAT IS SQL INJECTION? #BYPASSING LOGINS #ACCESSING SECRET DATA #Checking for vulnerability #Find the number of columns #Addressing vulnerable
