cdrom
30-12-2000, 12:59 PM
السلام عليكم . وكل عام وأنتم بخير يا هكر
What is an attack method?
In the context of Brutus, it is a service provided by the target that allows a remote client to authenticate against the target using client supplied credentials. For instance a UNIX server sat on a network somewhere may be offering Telnet and FTP services to remote users. Both telnet and FTP require the remote user to authenticate themselves before access is granted. For both these services the required credentials are usually a username and a password, therefore we have two available attack methods : FTP or Telnet. Some target systems will provide no opportunity for attack (at least not a remote authentication attack), perhaps they offer no remote services, perhaps they only offer anonymnous remote services (that require no authentication) or perhaps they offer authenticated remote services but use mechanisms to prevent authentication attacks such as account lockout or one time passwords of some sort.
الأخوه الكرام هذا البرامج لمن يعرف طريقة استخدامه
ارجوا ان يذكر ذلك - ولو شيئا بسيطا عنه - وان يرشدني
للطريقه الصحيحه لا ستخدامه فكثرة الأوامر في هالبرنامج تعبتني
بالمره ياليت ياماتبخلوا على في هالمعلومه.... منتظركم
تحياتي .. CD ROm
What is an attack method?
In the context of Brutus, it is a service provided by the target that allows a remote client to authenticate against the target using client supplied credentials. For instance a UNIX server sat on a network somewhere may be offering Telnet and FTP services to remote users. Both telnet and FTP require the remote user to authenticate themselves before access is granted. For both these services the required credentials are usually a username and a password, therefore we have two available attack methods : FTP or Telnet. Some target systems will provide no opportunity for attack (at least not a remote authentication attack), perhaps they offer no remote services, perhaps they only offer anonymnous remote services (that require no authentication) or perhaps they offer authenticated remote services but use mechanisms to prevent authentication attacks such as account lockout or one time passwords of some sort.
الأخوه الكرام هذا البرامج لمن يعرف طريقة استخدامه
ارجوا ان يذكر ذلك - ولو شيئا بسيطا عنه - وان يرشدني
للطريقه الصحيحه لا ستخدامه فكثرة الأوامر في هالبرنامج تعبتني
بالمره ياليت ياماتبخلوا على في هالمعلومه.... منتظركم
تحياتي .. CD ROm