xTSCrack - Manual
xTSCrack - Manual
Version: 0.9
Freeware Version
Summary
1 1.1 1.2 1.3 2 2.1 2.2 3 3.1 3.2 3.3 3.4 3.5 3.6 4
OVERVIEW .............................................................................................................................. 3 INTRODUCTION ...................................................................................................................................................... 3 OBJECTIVES ........................................................................................................................................................... 3 DEFINITIONS .......................................................................................................................................................... 3 UNDERSTANDING THE MAIN SCREEN .................................................................................... 3 OPTIONS AND CONTROLS ....................................................................................................................................... 3 NEW CONTROLS..................................................................................................................................................... 4 USING XTSCRACK ................................................................................................................... 5 AUDITING SINGLE HOST WITH WORDLIST & USERLIST....................................................................................... 5 AUDITING SINGLE HOST WITH WORDLIST & USERNAME ..................................................................................... 5 AUDITING SINGLE HOST WITH USERLIST WITH PASSWORD ................................................................................. 5 AUDITING RANGE LIST OR ADDRESS LIST WITH WORDLIST & USERLIST............................................................ 6 AUDITING RANGE LIST OR ADDRESS LIST WITH WORDLIST & USERNAME .......................................................... 6 AUDITING RANGE LIST WITH WORDLIST & USERLIST ......................................................................................... 6 CONTACT/SUPPORT ................................................................................................................ 7
1 Overview
1.1 Introduction
xTSCrack is a advanced RDP audit tool created by SeCToR-X ([email protected] or [email protected]) that allow user find weak passwords in Remote Desktop Service.
1.2 Objectives
Assist the Security Analyst and Penetration Tester find weak passwords over RDP Protocol.
1.3 Definitions
Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft, which provides a user with a graphical interface to another computer. The protocol is an extension of the ITU-T T.128 application sharing protocol.[1] Clients exist for most versions of Microsoft Windows (including Windows Mobile), Linux, Unix, Mac OS X, Android, and other modern operating systems. By default the server listens on TCP port 3389.[2] Microsoft currently refers to their official RDP server software as Remote Desktop Services, formerly "Terminal Services". Their official client software is currently referred to as Remote Desktop Connection, formerly "Terminal Services Client".
Once typed the start IP address and end IP address, the user will need select the option Range List in Target Mode options and then proceed with other options selection, like: Attack Method and File input options. The other option permitted in the new version is the Address List. The difference of range list to Address List is simple. The Range List audit hosts of same subnet and other audit the hosts of different subnet. This mean, we can audit a multiple IP address. Ex: 10.10.0.21, 192.168.1.2, 10.10.11.12, 10.11.13.4. To use
Address List you need click with right mouse button over the Address List field. After click 4 options will be shown on the screen:
Then click in menu item Add Address to add IP address to the list. Also you can import a text file with IP Address. The file must contain IPs separated by line feed. Once you defined the scope then choose the attack method and click in Start button.
3 Using xTSCrack
3.1 Auditing single host with Wordlist & Userlist
1 Type the IP Address to be audited; 2 Choose single IP Address in Target options; 3 Choose attack method Wordlist & Userlist; 4 Load the user list file clicking in button on right of the Userlist field; 5 Load the password list file clicking in button on right of the Wordlist field; 6 Choose the wordlist and click in button OK; 7 Click in start button and wait audit finish.
5 Load the user list file clicking in button on right of the Userlist field; 6 Choose the wordlist and click in button OK; 7 Click in start button and wait finish.
3.4 Auditing range list or address list with Wordlist & Userlist
1 Choose single Range List in Target options or Address List; 2.2 For range list type the start IP address in IP Address From field; 2.2.1 Type the end IP range Address in field To:; 2.3 For address list click with right mouse button over address list field; 2.3.1 Select the menu item Add Address or Import from file to add address to list; 3 Choose attack method Wordlist & Userlist; 4 Load the user list file clicking in button on right of the Userlist field; 5 Load the password list file clicking in button on right of the Wordlist field; 6 Choose the wordlist and click in button OK; 7 Click in start button and wait audit finish.
3.5 Auditing range list or address list with Wordlist & username
1 Choose single Range List in Target options or Address List; 2.2 For range list type the start IP address in IP Address From field; 2.2.1 Type the end IP range Address in field To:; 2.3 For address list click with right mouse button over address list field; 2.3.1 Select the menu item Add Address or Import from file to add address to list; 3 Type the username in Username field and domain of host in Domain field; 4 Choose attack method Wordlist with username; 5 Load the password list file clicking in button on right of the Wordlist field; 6 Choose the wordlist and click in button OK; 7 Click in start button and wait finish.
4 Contact/Support
Keep eye on http://atrixteam.blogspot.com/ for updates and applications for Penetration Test. Any bugs, suggestions please contact me at [email protected] or [email protected].