Jump to content

Munga Bunga's HTTP Brute Forcer


Recommended Posts

The creator of this site or the ISP(s) hosting any content on this site take NO responsibility for the way you use the information provided on this site. These files and anything else on this site are here for private purposes only and SHOULD NOT BE DOWNLOADED OR VIEWED WHATSOEVER! If you are affiliated with any government, or ANTI-Piracy group or any other related group or were formally a

worker of one you CANNOT enter this site, cannot access any of its files and you cannot view any of the files. All the objects on this site are PRIVATE property and are not meant for viewing or any other purposes other then bandwidth space. DO NOT ENTER whatsoever! If you enter this site you are not agreeing to these terms and you are violating code 431.322.12 of the Internet Privacy Act signed by Bill

Clinton in 1995 and that means that you CANNOT threaten our ISP(s) or any person(s) or company storing these files.

DISCLAIMER

DO NOT VIEW THIS SITE IF YOU ARE SEEKING TO PARTICIPATE IN ILLEGAL ACTIVITIES. FURTHER INFO WILL BE PROVIDED AT A LATER DATE REGARDING THE CONSEQUENCES OF ILLEGAL ACTIVITIES STEMMING FROM INFO RECEIVED FROM THIS SITE.

Эта утилита для людей, которые любят забывать пароли, или же взламывать их. Вообщем она подбирает логин и пароль на любой странице, где гребуется авторизация. В действии уже испробована, правда не мной, говорят, работает. Пишите свои коменты.

Download

Munga Bunga's HTTP Brute Forcer is a utility utilizing the HTTP protocol to brute force into any login mechanism/system that requires a username and password, on a web page (or HTML form).

In simple terms, if you can access an account on the web, by entering a username and password (or more), then you can brute force into that account, using this utility.

Brute Forcing is the process of trying various passwords from a dictionary file (automatically), for a given username, until the password matches the username.

This method can sometimes be very effective. When you combine the power of brute forcing, with the functionality of the program, then you end up with a tool which can be used for breaking into emails, affiliate programs, web sites, (any web based accounts), launching DoS attacks, flood emails, flood forms, flood databases and all that your imagination can extend too! However, you should note that DoS attacks and flooding activity is not supported or documented in the documentation. The utility only supports Brute Forcing (documentation wise). It can be used for other purposes, if you know how to write the definitions to drive those forces.

Definition Files are files ending in the .def extension, and contain information about a particular server, and the data to submit to it. Definition files are typically written by users. They are used to extend the power and capability of the program, based on your own definitions. However, the software comes bundled with some definition files.

post-10118-1100705786.jpg

Link to post
Share on other sites

speshy razocharovat polzovatelei legkoi najivi :-)rebjata vse ser²eznie systemi blokiryut login s odnogo IP posle vvedenia 3-5 nepravilnix parolei ;)a ves smisl brutusov v tom chto on dolbitk tomyje nyjno imet naverno primernyu biblioteky slov , na dannogo admina, togda mojet povezti esli konechno nety zashiti po IPvoobshem derzaite ;) :girlkiss:

Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...