lanjelot / patator

Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
GNU General Public License v2.0
3.58k stars 789 forks source link

VNC brute forcing not working #112

Closed vincentcox closed 5 years ago

vincentcox commented 5 years ago

I cannot get patator to work with VNC brute forcing. Here is what I tried:

┌─[✗]─[root@oscp]─[~/tools/]
└──╼ #patator vnc_login host=10.11.1.X password=FILE0 0=/usr/share/wordlists/rockyou.txt –t 1 –x retry:fgep!='Authentication failure' --max-retries 0 –x quit:code=0
Traceback (most recent call last):
  File "/usr/bin/patator", line 4913, in <module>
    powder = ctrl(module, [name] + sys.argv[1:])
  File "/usr/bin/patator", line 1458, in __init__
    for k, v in self.expand_key(arg):
ValueError: not enough values to unpack (expected 2, got 1)

No idea why it is throwing that error... Any ideas? I did some research about patator and VNC brute forcing, but not much to find about that.

lanjelot commented 5 years ago

You need to quote ! because it's expanded by your shell ;) Try: -x 'retry:fgrep!=Authentication failure'

vincentcox commented 5 years ago

Still not working: patator vnc_login host=10.11.1.X password=FILE0 0=/usr/share/wordlists/rockyou.txt –t 1 -x 'retry:fgrep!=Authentication failure' --max-retries 0

image

vincentcox commented 5 years ago

Seemed to be a "-" malformed. Works now! patator vnc_login host=10.11.1.1 password=FILE0 0='~/tools/SecLists/Passwords/darkweb2017-top10.txt' -t 1 -x "retry:fgrep!=Authentication failure" --max-retries 0