owncloud_bruteforcer/README.md

51 lines
2.1 KiB
Markdown
Raw Normal View History

2024-03-23 19:18:07 +00:00
# owncloud_bruteforcer
2024-04-13 15:09:16 +00:00
Simple tool to bruteforce owncloud instance accounts
2024-04-10 01:45:38 +00:00
2024-04-13 15:11:34 +00:00
> A word of caution - tool by default can DOS owncloud instance.
2024-04-11 09:25:49 +00:00
## Description
2024-04-11 09:14:28 +00:00
2024-04-13 15:09:16 +00:00
Tool:
- make GET request to acquire CSRF token + cookies
- make POST request using given username and password wordlist.
2024-04-11 09:14:28 +00:00
2024-04-11 09:25:49 +00:00
### Installation
2024-04-11 09:14:28 +00:00
`go install git.sual.in/casual/owncloud_bruteforcer@latest`
2024-04-11 09:25:49 +00:00
### Example
2024-04-11 09:18:29 +00:00
2024-04-11 09:25:49 +00:00
`owncloud_bruteforce -u "https://target.com/login" -P ./rockyou.txt`
2024-04-11 09:18:29 +00:00
2024-04-11 09:25:49 +00:00
### Help
2024-04-11 09:14:28 +00:00
```
Owncloud_bruteforcer - tool to bruteforce user
Usage:
owncloud_bruteforcer [flags]
Flags:
INPUT:
-url, -u string target's url to login page. Example "https://example.com/index.php/login, http://example.com/login "
-login, -l string username to bruteforce (default "admin")
-login-wordlist, -L string username wordlist
2024-04-11 09:25:49 +00:00
-password-wordlist, -P string password wordlist
2024-04-11 09:14:28 +00:00
-proxy, -x string HTTP proxy for packet inspection (Burp/Caidu/ZAP) (for example http://127.0.0.1:8080). But be aware, if you enable inspection then attack will fail because of delays
-threads, -t int threads to bruteforce (default 10)
```
2024-04-11 09:25:49 +00:00
## Notes (TODO)
2024-04-11 09:14:28 +00:00
2024-04-13 15:09:16 +00:00
- Expect to DOS service (100% CPU) (even if it have bruteforce protection enabled)
if you prefer not to, set `-t 5` or less (but it will slowdown attack)
- Successful login detected by redirect location after POST request. If user have 2FA, then app will not show found login:password. (Detects by redirect location)
- Bruteforce protection isn't detected (after hitting limit, response to POST - 403 instead 303)
- If there is internet connection problem or WAF/rate-limit/etc blocked you, you may recieve `can't create (POST) request: Post "https://target.com/login": context deadline exceeded (Client.Timeout exceeded while awaiting headers)` and attack will stop without a way to continue
2024-04-11 09:25:49 +00:00
- There is way to bruteforce administrator account which use different endpoint, possibly can allow to bruteforce admin account in same time without slowing down current version of tool
2024-04-11 09:14:28 +00:00
2024-04-11 09:25:49 +00:00
## License
2024-04-13 15:09:16 +00:00
This project is licensed under the MIT License - see the LICENSE file for details. I am not responsible for any actions or damage.