Chimera Remote Password Cracking Tool. Chimera was designed to be a fast, thread based, remote password cracking tool. It currently supports ftp, http, http- proxy, imap, ldap, mysql, nntp, pop. Since version 0. 2. Chimera supports IPv. SSL is also supported (through openssl). You can use passwords from wordlists, feed them from stdin or use a variety of brute force methods. You can supply a user- defined charset of use a pre- defined one. In genetics, a chimera is a single cDNA sequence originating from two transcripts. Methods have been devised to detect them, such as the Ribosomal Database Project's CHECK. However, in protein engineering. The Chimera Tool is a next generation online service tool for Nokia Lumia, Samsung and Blackberry models. Chimera on Microsoft Windows Platforms. The link should download a small Python program to your computer. Double check that shortcuts were created. You can also manage the number of threads used, as well as the connection timing, max connection errors, thread creation speed and other values. The http, http- proxy, imap, ldap, nntp and telnet modules are still in beta, so please don't bitch at me, just send in bug reports. Similar Programs. Hydra - the best remote passwd cracking tool out there. Unfortunately it uses fork() to do it's job, making it a lot less efficient. Support a wide variety of protocols. My goal is to implement most of them in chimera. Find it a http: //www. Chimera WILL NOT eat up 1. CPU time under normal conditions (as Hydra often likes to). Current stable version is 0. Previous versions (for the sake of completion)md. Usage. Lets jump right in and see how to use this great tool. There are a couple of things that chimera need to know before it starts it work. These things include: What am I attacking? What's the name of the account I'm attacking? What passwords do you want me to check? What am I attacking? You need to tell chimera the protocol that u want to attack. Currently pop. 3, ftp, mysql and http? Chimera needs to know what host you want to attack. This can in fact be a list of hosts. If you want to use a list of hosts, you need to use the - H option and supply a file that's every line is one hostname. If the service you are attacking is listening on an non- std port you can set the correct port with the - e option. Also if you want to use SSL you have to use the - l option. Syntax. - h www. example. H /home/sd/hostname? As with host names you can use a single users name of or a list of them that chimera will read from a file. Syntax. - U /home/sd/user? You have couple of options here. First you can check for - p single passwords, second you can use a - P list of passwords from a file or from stdin. Finally you can brute force. In order to make chimera run a brute force attack you must choose a charset. You can use a pre- defined one or supply your own. The options - m and - M are used to set the minimum and maximum password length. If you need more options when brute forcing you'll have to use an external tool to generate the passwords and feed chimera from stdin. Use - n, - y and - r to check for null passwords, passwords same as user names and passwords same as the reversed user name. Please note that you can use all the above methods at the same time. If more then one is given chimera will check them in this order: null passwords, passwords same as user name, passwords same as reversed user name, single passwords, password list, brute force. Syntax. - n check for null passwords.
If chimera exits and generates no output this means that no user name + password pair was matched to the service and host you where attacking. If you used the - v option you might get a lot more output before the user name + password for the service you where attacking. P /home/sd/tech/wordlists/full. Helpsd@infinity: 0 ~/web/sd/trash/res/chimera $ chimera. Lukasz Tomicki < tomicki@o. Reading other people's code is one of the best ways to learn programming. This is especially true when learning advanced topics like making multi- threading save, working with non- blocking sockets, etc. ABSOLUTELY NO WARRANTY is provided. I am not responsible for any harm the use of this tool may bring.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
October 2017
Categories |