Tags » Brute Force

Deadpool vs. Brute Force in Your First Look at DEADPOOL BI-ANNUAL #1!

Have you ever wanted to see the Merc With a Mouth throw down with a team of cybernetic, anthropomorphic animals? Well you’ve come to the right place because the gone (and also forgotten) 90s team of… 150 more words

Marvel

Web Application Penetration Testing for Beginners Part 2 – Brute-Force Attack

In last article, we set up lab to study web application penetration testing. Let’s first begin with vulnerable web application DVWA. You can login to application by entering credentials as ‘admin/password’. 280 more words

Web App Security

Medusa 'combo' word lists (default usernames and passwords) for SSH and Telnet services

Cirt.net is a useful resource that contains the default credentials for various devices.

I wrote a script that crawls, parses and extracts the credentials from cirt.net and outputs them into the “combo” format as required by medusa. 220 more words

Penetration Testing

Brute Force

It always pays off to have a plan. A strategy. Specific steps you have to do in order to reach your goal. It gives you feedback whether you’re on track or off track. 70 more words

DNS Zone Transfer - Network Enumeration

Hi Testers,

Adding some information about DNS Zone Transfer,
We all are working on Gathering DNS information – It may help us to have confidential information – isn’t it ? 346 more words

IT Security

696 - How Many Knights UVA Solution

This is an easy problem from uva judge http://uva.onlinejudge.org/index.php?option=com_onlinejudge&Itemid=8&category=24&page=show_problem&problem=637

Brute force.

How I did it

  • I read the number of rows and columns.
  • If rows = 1 or columns = 1 I return row * columns.
  • 198 more words
Snippets

Implement strStr() [LeetCode 7]

Frequency: ♥ ♥ ♥ ♥ ♥                Difficulty: ♥ ♥ ♥
Data Structure: String
Algorithm: brute force, Rolling Hash,KMP, Rabin-Karp,Boyer-Moore 312 more words

Java