![]() ![]() However, this is targeted at specific websites. He said that if an attacker wanted to do a brute force attack, they could use a large combo list (500,000+ credentials), but would need to set up a config file and get the proxy to configure it for multiple tries to not get blocked. Temple explained that while Sentry MBA is being traded on hacker forums, the real value is in combo and config lists, which contain user credentials for websites. “The real value is in the configuration files as it tells the tool how to attack a specific website these are often traded on hacker forums for significant sums.” “The tool is easy to use and draws information from three data sources to mount an effective attack: a configuration file to align the attack to a specific target a “combo list” (list of valid usernames and passwords) and a list of proxies from which to relay the attack,” he said. He explained that to use Sentry MBA effectively, the attacker needs to use a combination list of credentials and a configuration file that relates to the target. Speaking to Infosecurity, JUMPSEC managing director Sam Temple said that Sentry MBA works by harnessing proxies to conduct attacks. ![]() A tool which facilitates attacks on login frames has been responsible for a number of attacks. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |