Carnivore - Predator
Formerly known as THC HackSuite, Carnivore - Predator stands at the forefront of cutting-edge cybersecurity tools, redefining the landscape of penetration testing with unparalleled innovation. Designed to empower ethical hackers, security professionals, and enthusiasts alike, Carnivore - Predator is the ultimate Pentest CMS that puts you in command.
current version: 0.7.0 - PREDATOR
home > documentation > modules > How to use AntiFTP
This article explains how to effectively make use of AntiFTP.
author: Remco Kouw
created: 27-Apr-2024
updated: 27-Apr-2024

AntiFTP Introduction

This documentation details the functionality of the THC AntiFTP (thc_af) module.

AntiFTP is a module designed to brute force the password of a user account using wordlists.

Interface Parameters

  1. FTP Server Location: IP address or hostname of the FTP server.
  2. Username: The username whose password is to be retrieved.
  3. Verbose Mode: Displays detailed information during the brute force attack.
  4. Port Number: Port number on which the FTP service is listening.
  5. Timeout: Number of seconds before a timeout occurs.
  6. Select Wordlist: Menu containing names of wordlists from the Wordlists folder.

ModGlue Variables

  1. $_CONTEXT['thc_af']['log']: (string) Absolute path to the module's log file.
  2. $_CONTEXT['thc_af']['user']: (string) User to be attacked.
  3. $_CONTEXT['thc_af']['wordlist']: (string) Absolute path to the wordlist file located in the Wordlists folder.
  4. $_CONTEXT['thc_af']['wordlistdata']: (array) Data from the wordlist, each password on a new line.
  5. $_CONTEXT['thc_af']['port']: (int) TCP port on which the FTP service is listening, usually port 21.
  6. $_CONTEXT['thc_af']['timeout']: (int) Timeout in seconds.
  7. $_CONTEXT['thc_af']['keys']: (array) Previously hacked passwords found in the log file (available only when the View Passes case is set).
  8. $_CONTEXT['thc_af']['attempts']: (int) Total number of attempts.
  9. $_CONTEXT['thc_af']['found']: (boolean) Indicates if the password was found. If true, the password was found.
  10. $_CONTEXT['thc_af']['connection']: (resource) Connection to the FTP server.
  11. $_CONTEXT['thc_af']['lastpass']: (string) Last password attempt.
  12. $_CONTEXT['thc_af']['laststamp']: (int) Timestamp of the last attempt.

Resource Settings

  • Time Limit: PHP default.
  • Memory Limit: PHP default.

Expanding AntiFTP

N/A

Dependencies

  • FTP

Known Issues

This module utilizes dictionary attack brute forcing, which can be resource-intensive. If you encounter time limit or memory issues, consider adjusting the module's settings.

Created by Remco Kouw: 2008-2024