Brutemap - Let's find someone's account...

July 9, 2020
(519 views)

Brutemap is an open source penetration testing tool that automates testing accounts to the site's login page, based on Dictionary Attack. With this, you no longer need to search for other bruteforce tools and you also no longer need to ask CMS What is this? (only to find parameter forms), because brutemap will do it automatically. Brutemap is also equipped with an attack method that makes it easy for you to do account checking or test forms with the SQL injection bypass authentication technique.

Installation

Brutemap uses selenium to interact with the website. So, you need to install Web Driver for selenium first. See here. If you have installed the git package, you only need to clone the repository Git. Like this:

$ git clone https://github.com/brutemap-dev/brutemap.git

And, install the required modules:

$ pip install -r requirements.txt

Usage

For basic use:

$ python brutemap.py -t https://www.example.com/admin/login.php -u admin -p abc, root, default

To display a list of available options:

$ python brutemap.py -h

For more information about available options, you can visit the User's manual.

Attack method

On the brutemap tool, there are several attack methods that make it easy for you to check accounts or test forms.

Twin

The Twin Method is a method that tests passwords based on the current username index. And the purpose of this method is to simplify checking accounts

For example, I have 2 usernames:

Usernames
admin
root

And, 1 password:

Passwords
default

And it will come out, like this:

=> admin : default

The root username will not be tested, because it has no partner password.

Use the option --twin to activate this method

SQL Injection Bypass Authentication

This method will test the page form with SQL injection payloads, for more information see here

Use the option (-sB or --sqli-bypass) to activate this method.

SQL Injection Payloads

This method is the same as the SQL Injection Bypass Authentication method, but it will insert SQL injection payloads into the username.

For example, I have 2 usernames:

Usernames
admin
root

And, 2 payloads:

Payloads
') or true--
')) or 1--

And it will come out, like this:

=> admin') or true-- : ...
=> admin')) or 1--   : ...

Use the option (-sP or --sqli-payloads) to activate this method

Contributing

Before contributing to this project, please read the contributing guidelines.

Donate

We hope you are happy and we hope you donate! Please donate today to: https://paypal.me/aprilahijriyan (thanks!)

Links

Recommended From Hakin9
Security firm RSA Security breached
Security firm RSA Security breached

RSA Security is one of the biggest players in the enterprise security landscape, featuring advanced

Social media zombies: HBGary, USAF and the government
Social media zombies: HBGary, USAF and the government

HBGary ownage has probably been the most prominent example of complete take over carried out

Microsoft MPE privilege flaw identified
Microsoft MPE privilege flaw identified

Microsoft's Malware Protection Engine has been patched as Argeniss security expert identifies an 'elevation of

Virus hits London Stock Exchange (LSE)
Virus hits London Stock Exchange (LSE)

The London Stock Exchange website was attacked by malware hidden inside an advert on February

(519 views)
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.

What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.