Bruter 1.0 Released – Parallel Windows Password Brute Forcing Tool


Bruter 1.0 BETA 1 has been released. Bruter is a parallel login brute-forcer. This tool is intended to demonstrate the importance of choosing strong passwords. The goal of Bruter is to support a variety of services that allow remote authentication.

Bruter is a tool for the Win32 platform only.

PROTOCOL SUPPORT

It currently supports the following services:

  • FTP
  • HTTP (Basic)
  • HTTP (Form)
  • IMAP
  • MSSQL
  • MySQL
  • POP3
  • SMB-NT
  • SMTP
  • SNMP
  • SSH2
  • Telnet

DEPENDENCIES

You can download Bruter here:

Bruter_1.0_beta1.zip

Or read more here.

Posted in: Hacking Tools, Password Cracking Tools, Windows Hacking

, , , ,


Latest Posts:


Karkinos - Beginner Friendly Penetration Testing Tool Karkinos – Beginner Friendly Penetration Testing Tool
Karkinos is a light-weight Beginner Friendly Penetration Testing Tool, which is basically a 'Swiss Army Knife' for pen-testing and/or hacking CTF's.
Aclpwn.Py - Exploit ACL Based Privilege Escalation Paths in Active Directory Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active Directory
Aclpwn.py is a tool that interacts with BloodHound< to identify and exploit ACL based privilege escalation paths.
Vulhub - Pre-Built Vulnerable Docker Environments For Learning To Hack Vulhub – Pre-Built Vulnerable Docker Environments For Learning To Hack
Vulhub is an open-source collection of pre-built vulnerable docker environments for learning to hack. No pre-existing knowledge of docker is required, just execute two simple commands.
LibInjection - Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) LibInjection – Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS)
LibInjection is a C library to Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) through lexical analysis of real-world Attacks.
Grype - Vulnerability Scanner For Container Images & Filesystems Grype – Vulnerability Scanner For Container Images & Filesystems
Grype is a vulnerability scanner for container images and filesystems with an easy to install binary that supports the packages for most major *nix based OS.
APT-Hunter - Threat Hunting Tool via Windows Event Log APT-Hunter – Threat Hunting Tool via Windows Event Log
APT-Hunter is a threat hunting tool for windows event logs made from the perspective of the purple team mindset to provide detection for APT movements hidden in the sea of windows event logs.


10 Responses to Bruter 1.0 Released – Parallel Windows Password Brute Forcing Tool

  1. goodpeople January 31, 2008 at 12:41 pm #

    Always good to see new tools coming. Wonder how it holds up against Cain & Abel and John the Ripper

  2. Pantagruel February 3, 2008 at 1:31 am #

    Too bad it’s windows only, preffered Cain and Abel anyway

    @Goodpeople, I didn’t know John (the ripper) was able to do brute force login attempts. Guess you really learn somethings here ;)

  3. goodpeople February 3, 2008 at 12:02 pm #

    I stand corrected.

    Ofcourse I was talking about pass-crackers in general, but you are right. JTR is not a brute forcer. Oversight on my part. I’m sorry.

    As a side note: that is what you get when you’re only teaching instead of actively using it. You have a truckload of general information in your head. You only read up on the details when you need them in your classes.

  4. eM3rC February 7, 2008 at 8:08 am #

    Someone should give bruter a run for its money when compared to C&A. Would be cool to see who wins.

    I’m not sure if it was this site or another blog but I saw a post about the development of brute forcing software that utilizes the video card channels as a way of speeding up the bruting process. That combined with the new cards on the market, increased RAM sizes and faster processors, bruting should go amazingly fast.

  5. Pantagruel February 12, 2008 at 5:34 pm #

    @eM3rC

    We indeed had a post on the usage of the GPU for more than just fancy video display.
    (https://www.darknet.org.uk/2007/11/graphics-cards-the-next-big-thing-for-password-cracking/)

    Indeed both Ati (CTM)and Nvidia (CUDA) are providing a programming dev kit for cuda enabled GPU (have a look at http://en.wikipedia.org/wiki/Close_to_Metal or http://www.nvidia.com/object/cuda_home.html ) for more info. The fundamentals of the two are different (assembler vs C) but results will be in the same range.

  6. eM3rC February 13, 2008 at 2:58 am #

    @Pantagruel
    Thanks for the links. Also took a look into the developer kits and found it very interesting that the companies are doing that now.

    Quick side note, nVidia is going to be making processors for mobile phones now :)

  7. eLmaS May 12, 2008 at 9:08 pm #

    Always good to see new tools coming. Wonder how it holds up against Cain & Abel and John the Rippe

  8. visar September 2, 2008 at 1:55 pm #

    this website is very good

  9. nick September 8, 2008 at 7:47 pm #

    does ne one know how you determine teh “protocol” type when using bruter? and when would you select the brute force option? wouldn’t it be every time?

  10. Marc November 18, 2008 at 4:02 pm #

    Hi Guys…

    Installed the app, but I keep getting “error… Invalid Target” Any thoughts on this one? Doesn’t matter where I go. Firewall is off and nothing else is running.

    Thanks,

    Marc