Risk
10/28/2010
01:35 PM
Connect Directly
RSS
E-Mail
50%
50%

Easy-To-Find Brute-Force Tools

Tools are available to create word lists that can be used for brute-force attacks to nab passwords.

Several free and open source tools are available to create word lists that can be used for brute-force attacks to obtain passwords of social network users. They include:

>> Custom Word List Generator: Security researcher Robin Wood created CeWL as a way to create a custom word list based on spidering a Web site. This functionality is perfect for quickly determining unique words on a social network profile. CeWL is available for download from Wood's Web site, in the Samurai Web Testing Framework, and within the popular BackTrack 4 penetration testing distribution.

>> RSMangler: Robin Wood's RSMangler complements word-list-generating utilities like CeWL. It takes a word list and generates mangled combinations and manipulations of those words. For example, from "tom, eston, social" RSMangler would output: tomeston, tomsocial, estontom, socialeston, socialtom. It can be downloaded from the RandomStorm site.

>> Associative Word List Generator: This site generates word lists based on search terms that are queried from the Web site using typical search engine techniques. For example, if you search for "tom, eston, agent0x0, zombies, spylogic, security, justice," AWLG will search the Internet for those terms and give you back a listing of relevant keywords.

>> Common Users Password Profiler: Muris Kurgas created this word-list-generation script that uses information gathered online to answer a series of questions CUPP asks. Based on those answers, CUPP generates a custom word list. This tool can be quite handy if an attacker has already found out significant information about a potential victim from a social network profile. CUPP is preinstalled in the BackTrack 4 penetration testing distribution.

>> Userpass.py Script: Created by Mark Baggett, this script automatically generates customized word lists for specific targets. For example, a Google search is launched to find LinkedIn profiles of employees at a target company. Then the script spiders any Web sites found in a user's LinkedIn profile. It pulls the user's profile picture and checks a Web site called "tineye" to determine if the picture matches others on the Internet. If it does, those sites are spidered for keyword information. Finally, all the spidered sites are run through CeWL to generate custom word lists. Userpass.py script can be downloaded from the PaulDotCom Web site.

Go to the main story:
Social Networks' Threat To Security

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1544
Published: 2014-07-23
Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, allows remote attackers to execute arbitrary code via vectors that trigger cer...

CVE-2014-1547
Published: 2014-07-23
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

CVE-2014-1548
Published: 2014-07-23
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

CVE-2014-1549
Published: 2014-07-23
The mozilla::dom::AudioBufferSourceNodeEngine::CopyFromInputBuffer function in Mozilla Firefox before 31.0 and Thunderbird before 31.0 does not properly allocate Web Audio buffer memory, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and applica...

CVE-2014-1550
Published: 2014-07-23
Use-after-free vulnerability in the MediaInputPort class in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging incorrect Web Audio control-message ordering.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Where do information security startups come from? More important, how can I tell a good one from a flash in the pan? Learn how to separate ITSec wheat from chaff in this episode.