Page 1 of 2 12 LastLast
Results 1 to 10 of 11

Thread: Java based super brute force cracker

  1. #1

    Java based super brute force cracker

    Imagine a well traveled site such as yahoo.com,google.com or even AO. Then imagine a java coder who gets access to the web server...like the common web defacers. Only this coder has something else in mind all together...he wants to build a SUPER COMPUTER!. How can this be accomplished? What could be his purpose? Java can be used to turn the whole internet into a huge super brute force cracker by using DAMPP technology. See this link for detailed information: http://www.javaworld.com/javaworld/j...1-dampp_p.html

    The link above also contains source code for the applets which could be modified to do a distributed brute force crack. The applets currently only distribute a ray-tracing job...it could just as easy be a brute force cracker. This applet would run silently and use anyone's cpu who accessed the page. What I wonder is there a way to detect such an applet running ? .....hehe just think if you imbeded the app in a PoRn site! While the fools sit and pleasure themselves their system is being used for whatever purpose the coder dictates. This could turnout to be a real security concern for the "net". Seti is using a similar technology with the screen saver app....maybe we could give this idea.Poeple would just go to the site and compute the distributed information. I encourage everyone to give the above link a good look and just IMAGINE the possibilities.

  2. #2
    Senior Member
    Join Date
    Oct 2001
    Posts
    872

    Post Imagine

    ...Imagine scripties asking "How to hack Hotmail" now...


    next thing ya know they'll be asking: "Is Java a W32 App? ...I can't seem to find a place to download it on Google"


    ...Good post though. Imagine the Feds putting something like this on a 'host' site (yahoo?, google?, AO?), to crack the pw('s) of kiddie pr0n sites, or warez sites..., or hacktivist 'gatherings' ...whoa.

    Wait a min...no warez?!?!!?
    ...This Space For Rent.

    -[WebCarnage]

  3. #3
    I think this one will stay out of the scriptkidiot's arsenal for awhile...

  4. #4
    Senior Member
    Join Date
    Oct 2001
    Posts
    872

    Post Kiddiots

    Yeah...you may have a point there...I mean...with DAMPP technology (consdering the script kiddiot can't spell that last word) in the hands of some lamer might not even be a big deal.

    Lol...I went to a computer discussion chat room this morning. And I swear to you, some guy came in asking for instructions on how to use Sub7. Now...me being the curious type picked this up a while back, and found it to be as anoying as Windows itself. Being SO INCREDIBLY USER FRIENDLY!!! Anyways, this guy called ssj_hacker (I think thats what his/her handle was at least), and he came in asking for directions on how to use this S.O.B.! For Christ's sake and all that is Holy...

    I **** you not folks...I **** you not...
    ...This Space For Rent.

    -[WebCarnage]

  5. #5
    PHP/PostgreSQL guy
    Join Date
    Dec 2001
    Posts
    1,164
    For Christ's sake and all that is Holy...
    ROFL we feel your pain. I had some friends ask me how to configure and run subseven to which I told them to get out my sight before I did something bad...
    We the willing, led by the unknowing, have been doing the impossible for the ungrateful. We have done so much with so little for so long that we are now qualified to do just about anything with almost nothing.

  6. #6
    Hi mom!
    Join Date
    Aug 2001
    Posts
    1,103
    This reminded me of the worms installing dnetc. Same principle: your idle cpu cycles are used for something brute-force, only here, you've got to be infected by a worm, instead of opening an applet.

  7. #7
    Originally posted by Guus
    This reminded me of the worms installing dnetc. Same principle: your idle cpu cycles are used for something brute-force, only here, you've got to be infected by a worm, instead of opening an applet.
    hmmmmm.yes it is similar however this worm can be detected by AV software..the invisible DAMPP cannot be detected yet.

  8. #8
    Hi mom!
    Join Date
    Aug 2001
    Posts
    1,103
    "Yet" is the keyword here...

  9. #9
    Senior Member
    Join Date
    Oct 2001
    Posts
    872

    Post Java Brute Forcing...

    Yet...

    What about this 'new' (reasonably) concept of an 'inside-out firewall'. You must know about how a 'regular' firewall works (or at least I hope to God you do). But i've heard that this certain type of firewall regulates what goes out of your computer. Key-Word being out. So with this new firewall installed/upgraded to your regular one (for i'm sure in a little while almost all the firewall companies, even the free ones, will start using this if this Java Brute Forcer (or anything else it can do remotely to a certain computer for that matter) gets deep).

    ...Imagine that.
    ...This Space For Rent.

    -[WebCarnage]

  10. #10
    How About DDoS OUCH

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •