Bug 96641 - New port: security/medusa, a parallel password cracker
Summary: New port: security/medusa, a parallel password cracker
Status: Closed FIXED
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: Normal Affects Only Me
Assignee: freebsd-ports-bugs (Nobody)
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2006-05-02 06:50 UTC by David Thiel
Modified: 2006-05-02 08:38 UTC (History)
0 users

See Also:


Attachments
file.shar (2.06 KB, text/plain)
2006-05-02 06:50 UTC, David Thiel
no flags Details

Note You need to log in before you can comment on or make changes to this bug.
Description David Thiel 2006-05-02 06:50:13 UTC
Medusa is a parallel login bruteforcer - an alternative to THC-hydra(which
last I checked wasn't compiling properly  on FreeBSD in the first place).

From http://www.foofus.net/jmk/medusa/medusa.html:

Medusa is intended to be a speedy, massively parallel, modular, login
brute-forcer. The goal is to support as many services which allow remote
authentication as possible. The author considers following items as some
of the key features of this application:

* Thread-based parallel testing. Brute-force testing can be performed
against multiple hosts, users or passwords concurrently.

* Flexible user input. Target information (host/user/password) can be
specified in a variety of ways. For example, each item can be either
a single entry or a file containing multiple entries. Additionally, a
combination file format allows the user to refine their target listing.

* Modular design. Each service module exists as an independent .mod
file. This means that no modifications are necessary to the core
application in order to extend the supported list of services for
brute-forcing.
Comment 1 Cheng-Lung Sung freebsd_committer freebsd_triage 2006-05-02 08:37:58 UTC
State Changed
From-To: open->closed

New port added. Thank you.