From: Jamie (aouf77@dsl.pipex.com)
Date: Tue Jun 17 2003 - 16:52:43 EDT
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Tuesday 17 June 2003 21:07, Kroma Pierre wrote:
> Hi,
>
> I'm pentesting a ssh server version 2 and found with the timing bug a list
> of valid users. Do you know a brute force tool/script, which can check a
> ssh server, who only support ssh version 2?
I think this is what you're looking for:
http://packetstormsecurity.com/groups/teso/guess-who-0.44.tgz
- -jamie.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQE+73+o0oWsN6bx+R0RApQIAJ9G5ibMYvGVxc2qmY6YDC5pJq0bwQCfSZ9C
fJ+z4EtiGY0Qg7rdma54hxA=
=9Fz+
-----END PGP SIGNATURE-----
---------------------------------------------------------------------------
Attend the Black Hat Briefings & Training, July 28 - 31 in Las Vegas, the
world's premier technical IT security event! 10 tracks, 15 training sessions,
1,800 delegates from 30 nations including all of the top experts, from CSO's to
"underground" security specialists. See for yourself what the buzz is about!
Early-bird registration ends July 3. This event will sell out. www.blackhat.com
----------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:34 EDT