23 March 2007 | 14,757 views

ObiWaN – Web Server Brute Forcing from Phenoelit

Check For Vulnerabilities with Acunetix

This Phenoelit tool called ObiWaN is written to carry out brute force security testing on Webservers.

The idea behind this is webservers with simple challenge-response authentication mechanism mostly have no switches to set up intruder lockout or delay timings for wrong passwords. In fact this is the point to start from. Every user with a HTTP connection to a host with basic authentication can try username-password combinations as long as he/she likes.

Like other programs for UNIX system passwords (crack) or NT passwords (l0phtcrack) ObiWaN uses wordlists and alternations of numeric or alpha-numeric characters as possible passwords. Since Webservers allow unlimited requests it is a question of time and bandwith to break in a server system.

The most interesting targets are web based administration frontends like Netscapes Server Administration. If you can break in, you are able to create accounts, stop the server and modify its content. Real fun.

You can read the full documentation here.

Various versions (including Windows, Linux and Solaris) of ObiWaN are available for download here:

ObiWan – Project 2068/11.1



Recent in Hacking Tools:
- Arachni v1.0 Released – Web Application Security Scanner Framework
- iSniff-GPS – Passive Wifi Sniffing Tool With Location Data
- masscan – The Fastest TCP Port Scanner

Related Posts:
- Router/Switch Default Password List Updated
- TSGrinder – Brute Force Terminal Services Server
- Caecus – Web Brute Forcing Tool with OCR Support

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,870,752 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,061,837 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 625,371 views

Advertise on Darknet

One Response to “ObiWaN – Web Server Brute Forcing from Phenoelit”