crowbar 介绍

crowbar(正式名称为Levye)是一个在渗透测试中使用的暴力破解工具。在一些协议下,以不同的方式受到发展,根据其他受流行的暴力破解工具 。作为一个例子,而大多数暴力破解工具使用用户名和密码为SSH暴破,Crowba使用SSH密钥(年代)。这允许对任何私有密匙已经获得渗透测试过程中,用于攻击其他SSH服务器。

Author: Gökhan ALKAN
License: Expat

crowbar 来源&主页
Kali crowbar Repo 仓库

crowbar – 暴力破解工具

root@kali:~# crowbar -h
usage: use --help for further information

Crowbar is a brute force tool which supports OpenVPN, Remote Desktop Protocol,
SSH Private Keys and VNC Keys.

positional arguments:

optional arguments:
  -h, --help    show this help message and exit
  -b {vnckey,sshkey,rdp,openvpn}, --brute {vnckey,sshkey,rdp,openvpn}
              Target service
  -s SERVER, --server SERVER
              Static target
  -S SERVER_FILE, --serverfile SERVER_FILE
              Multiple targets stored in a file
  -u USERNAME [USERNAME ...], --username USERNAME [USERNAME ...]
              Static name to login with
              Multiple names to login with, stored in a file
  -n THREAD, --number THREAD
              Number of threads to be active at once
  -l FILE, --log FILE   Log file (only write attempts)
  -o FILE, --output FILE
              Output file (write everything else)
  -c PASSWD, --passwd PASSWD
              Static password to login with
  -C FILE, --passwdfile FILE
              Multiple passwords to login with, stored in a file
  -t TIMEOUT, --timeout TIMEOUT
              [SSH] How long to wait for each thread (seconds)
  -p PORT, --port PORT
              Alter the port if the service is not using the default value
  -k KEY_FILE, --keyfile KEY_FILE
              [SSH/VNC] (Private) Key file or folder containing multiple files
  -m CONFIG, --config CONFIG
              [OpenVPN] Configuration file
  -d, --discover      Port scan before attacking open ports
  -v, --verbose       Enable verbose output (-vv for more)
  -D, --debug         Enable debug mode
  -q, --quiet         Only display successful logins

crowbar 示例


root@kali:~# crowbar -b rdp -s -u victim -C /root/words.txt -n 1
2017-10-10 14:59:55 START
2017-10-10 14:59:55 Crowbar v0.3.5-dev
2017-10-10 14:59:55 Trying
2017-10-10 15:00:08 RDP-SUCCESS : - victim:s3cr3t
2017-10-10 15:00:08 STOP