FreeBSD Bugzilla – Attachment 168851 Details for
Bug 206803
[new port] security/acccheck: Password dictionary attack tool that targets windows authentication via the SMB protocol
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
[new port] : security/acccheck : updated shar file
acccheck.shar (text/plain), 6.18 KB, created by
Rihaz Jerrin
on 2016-03-31 20:27:58 UTC
(
hide
)
Description:
[new port] : security/acccheck : updated shar file
Filename:
MIME Type:
Creator:
Rihaz Jerrin
Created:
2016-03-31 20:27:58 UTC
Size:
6.18 KB
patch
obsolete
># This is a shell archive. Save it in a file, remove anything before ># this line, and then unpack it by entering "sh file". Note, it may ># create directories; files and directories will be owned by you and ># have default permissions. ># ># This archive contains: ># ># acccheck ># acccheck/Makefile ># acccheck/distinfo ># acccheck/pkg-descr ># acccheck/files ># acccheck/files/patch-acccheck.pl ># acccheck/pkg-plist ># >echo c - acccheck >mkdir -p acccheck > /dev/null 2>&1 >echo x - acccheck/Makefile >sed 's/^X//' >acccheck/Makefile << '2e4ff7b3b67099dc861a9c243c4a17a8' >X# $FreeBSD$ >X >XPORTNAME= acccheck >XPORTVERSION= 0.2.1 >XCATEGORIES= security >XMASTER_SITES= https://labs.portcullis.co.uk/download/ >XDISTFILES= ${DISTNAME:S/./-/g}${EXTRACT_SUFX} >X >XMAINTAINER= rihaz.jerrin@gmail.com >XCOMMENT= Password dictionary attack tool for SMB >X >XLICENSE= GPLv2 >X >XRUN_DEPENDS= smbclient:${PORTSDIR}/net/samba-smbclient >X >XUSES= perl5 shebangfix >XSHEBANG_FILES= ${WRKSRC}/acccheck.pl >X >XWRKSRC= ${WRKDIR}/${PORTNAME}-${PORTVERSION:S/./-/g} >X >XNO_BUILD= yes >XNO_ARCH= yes >X >Xdo-install: >X ${INSTALL_SCRIPT} ${WRKSRC}/acccheck.pl ${STAGEDIR}${LOCALBASE}/bin/acccheck >X ${MKDIR} ${STAGEDIR}${DOCSDIR} >X ${INSTALL_DATA} ${WRKSRC}/COPYING.ACCCHECK ${STAGEDIR}${DOCSDIR} >X ${INSTALL_DATA} ${WRKSRC}/COPYING.GPL ${STAGEDIR}${DOCSDIR} >X ${INSTALL_DATA} ${WRKSRC}/README.TXT ${STAGEDIR}${DOCSDIR} >X >X.include <bsd.port.mk> >2e4ff7b3b67099dc861a9c243c4a17a8 >echo x - acccheck/distinfo >sed 's/^X//' >acccheck/distinfo << '0f7321f515da27326424aa2f19e7a3ea' >XSHA256 (acccheck-0-2-1.tar.gz) = fc2274dfa16207e1b74c6fb40307286cfb4d83d3d3f842737c8e47f7c531e380 >XSIZE (acccheck-0-2-1.tar.gz) = 10008 >0f7321f515da27326424aa2f19e7a3ea >echo x - acccheck/pkg-descr >sed 's/^X//' >acccheck/pkg-descr << 'b483acb06ed02a07f283563beb5409bd' >XThe tool is designed as a password dictionary attack tool >Xthat targets windows authentication via the SMB protocol. >XIt is really a wrapper script around the 'smbclient' binary, >Xand as a result is dependent on it for its execution. >X >XSource: https://labs.portcullis.co.uk/tools/acccheck/ >b483acb06ed02a07f283563beb5409bd >echo c - acccheck/files >mkdir -p acccheck/files > /dev/null 2>&1 >echo x - acccheck/files/patch-acccheck.pl >sed 's/^X//' >acccheck/files/patch-acccheck.pl << '7686adb7d2c6965cf3fb79cbccb760ce' >X--- acccheck.pl.orig 2016-03-31 19:53:48 UTC >X+++ acccheck.pl >X@@ -52,7 +52,7 @@ >X >X ############################################################################### >X #Usage: # >X-# ./acccheck.pl [optional] # >X+# acccheck [optional] # >X # # >X # -t <single target ip> # >X # OR # >X@@ -64,13 +64,13 @@ >X # -U <file containing usernames> # >X # -v <verbose mode> # >X #Examples: # >X-# acccheck.pl -t 10.10.10.1 # >X+# acccheck -t 10.10.10.1 # >X # This will attempt a BLANK password against the # >X # Administrator account. # >X-# acccheck.pl -t 10.10.10.1 -p password.txt # >X+# acccheck -t 10.10.10.1 -p password.txt # >X # This will attempt all password in 'password.txt' against # >X # the 'administrator' account. # >X-# acccehck.pl -t 10.10.10.1 -u users.txt -p password.txt # >X+# acccheck -t 10.10.10.1 -u users.txt -p password.txt # >X # This will attempt all of the passwords in 'password.txt' # >X # against the users in 'users.txt'. # >X ############################################################################### >X@@ -167,12 +167,12 @@ $verbose=0; >X >X #show usage information and quit >X sub usage { >X- print color("green"), "\nacccheck.pl v0.2.1 - By Faiz\n\n"; >X+ print color("green"), "\nacccheck v0.2.1 - By Faiz\n\n"; >X print "Description:\n"; >X print "Attempts to connect to the IPC\$ and ADMIN\$ shares depending on which flags have been\n"; >X print "chosen, and tries a combination of usernames and passwords in the hope to identify\n"; >X print "the password to a given account via a dictionary password guessing attack.\n", color("reset"); >X- print "\nUsage = ./acccheck.pl [optional]\n\n"; >X+ print "\nUsage = acccheck [optional]\n\n"; >X print " -t [single host IP address]\n"; >X print " OR \n"; >X print " -T [file containing target ip address(es)]\n"; >X@@ -185,13 +185,13 @@ sub usage { >X print " -v [verbose mode]\n\n"; >X print color("green"), "Examples\n"; >X print "Attempt the 'Administrator' account with a [BLANK] password.\n"; >X- print " acccheck.pl -t 10.10.10.1\n"; >X+ print " acccheck -t 10.10.10.1\n"; >X print "Attempt all passwords in 'password.txt' against the 'Administrator' account.\n"; >X- print " acccheck.pl -t 10.10.10.1 -P password.txt\n"; >X+ print " acccheck -t 10.10.10.1 -P password.txt\n"; >X print "Attempt all password in 'password.txt' against all users in 'users.txt'.\n"; >X- print " acccehck.pl -t 10.10.10.1 -U users.txt -P password.txt\n"; >X+ print " acccehck -t 10.10.10.1 -U users.txt -P password.txt\n"; >X print "Attempt a single password against a single user.\n"; >X- print " acccheck.pl -t 10.10.10.1 -u administrator -p password\n", color("reset"); >X+ print " acccheck -t 10.10.10.1 -u administrator -p password\n", color("reset"); >X exit(); >X } >X >7686adb7d2c6965cf3fb79cbccb760ce >echo x - acccheck/pkg-plist >sed 's/^X//' >acccheck/pkg-plist << 'c986a36df2d3be74bb7d9fd0baf245a0' >Xbin/acccheck >X%%DOCSDIR%%/COPYING.ACCCHECK >X%%DOCSDIR%%/COPYING.GPL >X%%DOCSDIR%%/README.TXT >c986a36df2d3be74bb7d9fd0baf245a0 >exit >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 206803
:
166362
| 168851