Brutemap - Let's find someone's account...

(40 views)

Brutemap is an open source penetration testing tool that automates testing accounts to the site's login page, based on Dictionary Attack. With this, you no longer need to search for other bruteforce tools and you also no longer need to ask CMS What is this? (only to find parameter forms), because brutemap will do it automatically. Brutemap is also equipped with an attack method that makes it easy for you to do account checking or test forms with the SQL injection bypass authentication technique.

Installation

Brutemap uses selenium to interact with the website. So, you need to install Web Driver for selenium first. See here. If you have installed the git package, you only need to clone the repository Git. Like this:

$ git clone https://github.com/brutemap-dev/brutemap.git

And, install the required modules:

$ pip install -r requirements.txt

Usage

For basic use:

$ python brutemap.py -t http://www.example.com/admin/login.php -u admin -p abc, root, default

To display a list of available options:

$ python brutemap.py -h

For more information about available options, you can visit the User's manual.

Attack method

On the brutemap tool, there are several attack methods that make it easy for you to check accounts or test forms.

Twin

The Twin Method is a method that tests passwords based on the current username index. And the purpose of this method is to simplify checking accounts

For example, I have 2 usernames:

Usernames
admin
root

And, 1 password:

Passwords
default

And it will come out, like this:

=> admin : default

The root username will not be tested, because it has no partner password.

Use the option --twin to activate this method

SQL Injection Bypass Authentication

This method will test the page form with SQL injection payloads, for more information see here

Use the option (-sB or --sqli-bypass) to activate this method.

SQL Injection Payloads

This method is the same as the SQL Injection Bypass Authentication method, but it will insert SQL injection payloads into the username.

For example, I have 2 usernames:

Usernames
admin
root

And, 2 payloads:

Payloads
') or true--
')) or 1--

And it will come out, like this:

=> admin') or true-- : ...
=> admin')) or 1--   : ...

Use the option (-sP or --sqli-payloads) to activate this method

Contributing

Before contributing to this project, please read the contributing guidelines.

Donate

We hope you are happy and we hope you donate! Please donate today to: https://paypal.me/aprilahijriyan (thanks!)

Links

July 9, 2020
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023