Lazar Posted November 17, 2004 Report Share Posted November 17, 2004 The creator of this site or the ISP(s) hosting any content on this site take NO responsibility for the way you use the information provided on this site. These files and anything else on this site are here for private purposes only and SHOULD NOT BE DOWNLOADED OR VIEWED WHATSOEVER! If you are affiliated with any government, or ANTI-Piracy group or any other related group or were formally a worker of one you CANNOT enter this site, cannot access any of its files and you cannot view any of the files. All the objects on this site are PRIVATE property and are not meant for viewing or any other purposes other then bandwidth space. DO NOT ENTER whatsoever! If you enter this site you are not agreeing to these terms and you are violating code 431.322.12 of the Internet Privacy Act signed by Bill Clinton in 1995 and that means that you CANNOT threaten our ISP(s) or any person(s) or company storing these files. DISCLAIMER DO NOT VIEW THIS SITE IF YOU ARE SEEKING TO PARTICIPATE IN ILLEGAL ACTIVITIES. FURTHER INFO WILL BE PROVIDED AT A LATER DATE REGARDING THE CONSEQUENCES OF ILLEGAL ACTIVITIES STEMMING FROM INFO RECEIVED FROM THIS SITE. Эта утилита для людей, которые любят забывать пароли, или же взламывать их. Вообщем она подбирает логин и пароль на любой странице, где гребуется авторизация. В действии уже испробована, правда не мной, говорят, работает. Пишите свои коменты. Download Munga Bunga's HTTP Brute Forcer is a utility utilizing the HTTP protocol to brute force into any login mechanism/system that requires a username and password, on a web page (or HTML form). In simple terms, if you can access an account on the web, by entering a username and password (or more), then you can brute force into that account, using this utility. Brute Forcing is the process of trying various passwords from a dictionary file (automatically), for a given username, until the password matches the username. This method can sometimes be very effective. When you combine the power of brute forcing, with the functionality of the program, then you end up with a tool which can be used for breaking into emails, affiliate programs, web sites, (any web based accounts), launching DoS attacks, flood emails, flood forms, flood databases and all that your imagination can extend too! However, you should note that DoS attacks and flooding activity is not supported or documented in the documentation. The utility only supports Brute Forcing (documentation wise). It can be used for other purposes, if you know how to write the definitions to drive those forces. Definition Files are files ending in the .def extension, and contain information about a particular server, and the data to submit to it. Definition files are typically written by users. They are used to extend the power and capability of the program, based on your own definitions. However, the software comes bundled with some definition files. Quote Link to post Share on other sites
Zmei Posted November 22, 2004 Report Share Posted November 22, 2004 speshy razocharovat polzovatelei legkoi najivi )rebjata vse ser²eznie systemi blokiryut login s odnogo IP posle vvedenia 3-5 nepravilnix parolei ;)a ves smisl brutusov v tom chto on dolbitk tomyje nyjno imet naverno primernyu biblioteky slov , na dannogo admina, togda mojet povezti esli konechno nety zashiti po IPvoobshem derzaite Quote Link to post Share on other sites
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.