Warning . All information provided in this article is published for informational purposes and in no case is a guide to action.
A fairly popular tool among computer crackers is a brute force attack or dictionary attack. This method is suitable for those cases when all other methods to penetrate the remote system are exhausted. Therefore, it is so attractive for kiddis scripts (novice crackers) who are unable to study the system in detail for vulnerabilities. These go to the “frontal attack” and at first they don’t even know how to use brutus aet2, even such an elementary program.
, (, , ssh ) . . -, . - brutus aet2, . .
. , brutus aet2. -, , , ( ). , . ( ) - , . - , , . - , . , , ( - ).
, "" , , . : - . , . , brutus aet2, , " ". , ( . , 34 34 !) , users.txt . ( ). ( -), . - -. - , RDP.
, . "". , "". "". , brutus aet2. ! , . . , , . . , , . , . , (272 273 ). ( ) brutus aet2, , , . . - .