Monday, August 28, 2017

Medusa 1.4 – Parallel Password Cracker Released for Download

What is Medusa? Medusa is a speedy, massively parallel, modular, login brute-forcer for network services created by the geeks at Foofus.net.
The Key Features are as follows:
  • Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.
  • Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.
  • Modular design. Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing.
It currently has modules for the following services:
  • CVS
  • FTP
  • HTTP
  • IMAP
  • MS-SQL
  • MySQL
  • NCP (NetWare)
  • NNTP
  • PcAnywhere
  • POP3
  • PostgreSQL
  • rexec
  • rlogin
  • rsh
  • SMB
  • SMTP (AUTH/VRFY)
  • SNMP
  • SSHv2
  • SVN
  • Telnet
  • VmAuthd
  • VNC
It also includes a basic web form module and a generic wrapper module for external scripts.
While Medusa was designed to serve the same purpose as THC-Hydra, there are several significant differences. For a brief comparison, see here.
It’s been over a year since version 1.3 was released and there has been a bunch of changes. This release includes multiple bug fixes, several new modules and additional module functionality. A somewhat detailed report is available here
You can download Medusa 1.4 here:

Ra1NX PHP Bot PubCall Authentication Bypass Remote Code Execution

This module allows remote command execution on the PHP IRC bot Ra1NX by using the public call feature in private message to covertly bypass the authentication system.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool
 DOWNLOAD NOW

Module Name

exploit/multi/misc/ra1nx_pubcall_exec

Authors

  • bwall

References

Targets

  • Ra1NX / Unix
  • Ra1NX / Windows

Platforms

  • unix
  • windows

Architectures

  • cmd

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
msf > use exploit/multi/misc/ra1nx_pubcall_exec msf exploit(ra1nx_pubcall_exec) > show targets ...targets... msf exploit(ra1nx_pubcall_exec) > set TARGET msf exploit(ra1nx_pubcall_exec) > show options ...show and set options... msf exploit(ra1nx_pubcall_exec) > exploit
https://www.rapid7.com/db/modules/exploit/multi/misc/ra1nx_pubcall_exec