2
0
mirror of https://github.com/lanjelot/patator synced 2024-11-10 01:13:31 +00:00

Merge pull request #59 from g0tmi1k/README

Cleaned up the README
This commit is contained in:
lanjelot 2017-06-02 08:29:17 +10:00 committed by GitHub
commit c9656b5ea6

View File

@ -3,42 +3,42 @@ Patator was written out of frustration from using Hydra, Medusa, Ncrack, Metaspl
Currently it supports the following modules: Currently it supports the following modules:
``` ```
* ftp_login : Brute-force FTP * `ftp_login` : Brute-force FTP
* ssh_login : Brute-force SSH * `ssh_login` : Brute-force SSH
* telnet_login : Brute-force Telnet * `telnet_login` : Brute-force Telnet
* smtp_login : Brute-force SMTP * `smtp_login` : Brute-force SMTP
* smtp_vrfy : Enumerate valid users using the SMTP VRFY command * `smtp_vrfy` : Enumerate valid users using the SMTP VRFY command
* smtp_rcpt : Enumerate valid users using the SMTP RCPT TO command * `smtp_rcpt` : Enumerate valid users using the SMTP RCPT TO command
* finger_lookup : Enumerate valid users using Finger * `finger_lookup` : Enumerate valid users using Finger
* http_fuzz : Brute-force HTTP/HTTPS * `http_fuzz` : Brute-force HTTP/HTTPS
* ajp_fuzz : Brute-force AJP * `ajp_fuzz` : Brute-force AJP
* pop_login : Brute-force POP * `pop_login` : Brute-force POP
* pop_passd : Brute-force poppassd (not POP3) * `pop_passd` : Brute-force poppassd (not POP3)
* imap_login : Brute-force IMAP * `imap_login` : Brute-force IMAP
* ldap_login : Brute-force LDAP * `ldap_login` : Brute-force LDAP
* smb_login : Brute-force SMB * `smb_login` : Brute-force SMB
* smb_lookupsid : Brute-force SMB SID-lookup * `smb_lookupsid` : Brute-force SMB SID-lookup
* rlogin_login : Brute-force rlogin * `rlogin_login` : Brute-force rlogin
* vmauthd_login : Brute-force VMware Authentication Daemon * `vmauthd_login` : Brute-force VMware Authentication Daemon
* mssql_login : Brute-force MSSQL * `mssql_login` : Brute-force MSSQL
* oracle_login : Brute-force Oracle * `oracle_login` : Brute-force Oracle
* mysql_login : Brute-force MySQL * `mysql_login` : Brute-force MySQL
* mysql_query : Brute-force MySQL queries * `mysql_query` : Brute-force MySQL queries
* rdp_login : Brute-force RDP (NLA) * `rdp_login` : Brute-force RDP (NLA)
* pgsql_login : Brute-force PostgreSQL * `pgsql_login` : Brute-force PostgreSQL
* vnc_login : Brute-force VNC * `vnc_login` : Brute-force VNC
* dns_forward : Brute-force DNS * `dns_forward` : Brute-force DNS
* dns_reverse : Brute-force DNS (reverse lookup subnets) * `dns_reverse` : Brute-force DNS (reverse lookup subnets)
* ike_enum : Enumerate IKE transforms * `ike_enum` : Enumerate IKE transforms
* snmp_login : Brute-force SNMPv1/2 and SNMPv3 * `snmp_login` : Brute-force SNMPv1/2 and SNMPv3
* unzip_pass : Brute-force the password of encrypted ZIP files * `unzip_pass` : Brute-force the password of encrypted ZIP files
* keystore_pass : Brute-force the password of Java keystore files * `keystore_pass` : Brute-force the password of Java keystore files
* umbraco_crack : Crack Umbraco HMAC-SHA1 password hashes * `umbraco_crack` : Crack Umbraco HMAC-SHA1 password hashes
``` ```
The name "Patator" comes from https://www.youtube.com/watch?v=kU2yPJJdpag The name "Patator" comes from https://www.youtube.com/watch?v=kU2yPJJdpag
Patator is NOT script-kiddie friendly, please read the README inside patator.py before reporting. Patator is NOT script-kiddie friendly, please read the README inside `patator.py` before reporting.
@lanjelot @lanjelot
@ -60,7 +60,7 @@ $ ftp_login host=10.0.0.1 user=FILE0 0=logins.txt password=asdf -x ignore:mesg='
... ...
``` ```
Tested against vsftpd-3.0.2-9 on CentOS 7.0-1406 Tested against `vsftpd-3.0.2-9` on `CentOS 7.0-1406`
* SSH : Time-based user enumeration * SSH : Time-based user enumeration