Medusa Parallel Network Login Auditor by Foofus


Something similar to THC-HYDRA, Medusa was written by JoMo-Kun from Foofus.

Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application:

  • Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.
  • Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.
  • Modular design. Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing.

Source: http://www.foofus.net/?page_id=51
Source: http://www.foofus.net/~jmk/medusa/medusa.html

Installing Medusa on Ubuntu 10.10

wget http://www.foofus.net/jmk/tools/medusa-2.0.tar.gz
tar -xvzf medusa-2.0.tar.gz
cd medusa-2.0
./configure
make
sudo make install
Advertisements

One Response to “Medusa Parallel Network Login Auditor by Foofus”

  1. Cracking SMBNT with Medusa « Genesis Database Says:

    […] I am learning more about the SMB protocol for Windows, I came across Medusa.  So first thing I did was try and hook it up with a dictionary and attack my Windows OS which is […]


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: