Risk
10/28/2010
01:35 PM
Connect Directly
RSS
E-Mail
50%
50%

Easy-To-Find Brute-Force Tools

Tools are available to create word lists that can be used for brute-force attacks to nab passwords.

Several free and open source tools are available to create word lists that can be used for brute-force attacks to obtain passwords of social network users. They include:

>> Custom Word List Generator: Security researcher Robin Wood created CeWL as a way to create a custom word list based on spidering a Web site. This functionality is perfect for quickly determining unique words on a social network profile. CeWL is available for download from Wood's Web site, in the Samurai Web Testing Framework, and within the popular BackTrack 4 penetration testing distribution.

>> RSMangler: Robin Wood's RSMangler complements word-list-generating utilities like CeWL. It takes a word list and generates mangled combinations and manipulations of those words. For example, from "tom, eston, social" RSMangler would output: tomeston, tomsocial, estontom, socialeston, socialtom. It can be downloaded from the RandomStorm site.

>> Associative Word List Generator: This site generates word lists based on search terms that are queried from the Web site using typical search engine techniques. For example, if you search for "tom, eston, agent0x0, zombies, spylogic, security, justice," AWLG will search the Internet for those terms and give you back a listing of relevant keywords.

>> Common Users Password Profiler: Muris Kurgas created this word-list-generation script that uses information gathered online to answer a series of questions CUPP asks. Based on those answers, CUPP generates a custom word list. This tool can be quite handy if an attacker has already found out significant information about a potential victim from a social network profile. CUPP is preinstalled in the BackTrack 4 penetration testing distribution.

>> Userpass.py Script: Created by Mark Baggett, this script automatically generates customized word lists for specific targets. For example, a Google search is launched to find LinkedIn profiles of employees at a target company. Then the script spiders any Web sites found in a user's LinkedIn profile. It pulls the user's profile picture and checks a Web site called "tineye" to determine if the picture matches others on the Internet. If it does, those sites are spidered for keyword information. Finally, all the spidered sites are run through CeWL to generate custom word lists. Userpass.py script can be downloaded from the PaulDotCom Web site.

Go to the main story:
Social Networks' Threat To Security

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.