- Carnivore - Predator
- Formerly known as THC HackSuite, Carnivore - Predator stands at the forefront of cutting-edge cybersecurity tools, redefining the landscape of penetration testing with unparalleled innovation. Designed to empower ethical hackers, security professionals, and enthusiasts alike, Carnivore - Predator is the ultimate Pentest CMS that puts you in command.
current version: 0.7.0 - PREDATOR
This article explains how to effectively make use of THC xSSH.
author: Remco Kouw
created: 03-May-2024
updated: 03-May-2024
THC xSSH Introduction
This documentation details the functionality of the THC xSSH (thc_xh) module.
THC xSSH utilizes a dictionary attack approach to guess user passwords for SSH access.
Interface Parameters:
- SSH Server Location: The host where the SSH server is located.
- Username: The username to attack.
- Port: The port where the SSH service is listening.
- Wordlist: Dropdown menu containing wordlists from the Wordlists folder.
ModGlue Variables:
- $_CONTEXT['thc_xh']['log']: (string) Absolute path to the log file where successful passwords are stored.
- $_CONTEXT['thc_xh']['results']['result']: (boolean) Result of the brute-force attack (true if successful, false otherwise).
- $_CONTEXT['thc_xh']['results']['password']: (string) The correct password if the attack was successful.
- $_CONTEXT['thc_xh']['port']: (int) The TCP port where SSH is listening.
- $_CONTEXT['thc_xh']['user']: (string) The username to attack.
- $_CONTEXT['thc_xh']['host']: (string) The host where the SSH server is located.
- $_CONTEXT['thc_xh']['keys']: (array) Dump of successfully cracked passwords (applies to View Passes case only).
- $_CONTEXT['thc_xh']['wordlistname']: (string) Absolute path to the wordlist file in the Wordlists folder.
- $_CONTEXT['thc_xh']['wordlist']: (array) Content of the wordlist.
- $_CONTEXT['thc_xh']['loginattempts']: (int) Number of attempts made.
- $_CONTEXT['thc_xh']['result']: (boolean) Result of the brute-force attack.
- $_CONTEXT['thc_xh']['connection']: (resource) Connection to the SSH server.
- $_CONTEXT['thc_xh']['wordlistwords']: (int) Number of passwords used in the attack.
- $_CONTEXT['thc_xh']['currentpass']: (string) Password used in the current brute-force attempt.
- $_CONTEXT['thc_xh']['writetext']: (string) Data entry for the log file when a password is guessed.
- $_CONTEXT['thc_xh']['totaltime']: (int) Total execution time.
- $_CONTEXT['thc_xh']['resultstring']: (string) Result string sent to the user.
Resource Settings:
- Time Limit: PHP default.
- Memory Limit: PHP default.
Expanding THC xSSH:
N/A
Dependencies:
SSH2
Known Issues:
This module uses dictionary attacks for brute-forcing, which can be resource-intensive. If you encounter time limit or memory issues, consider adjusting the module's settings.
Created by Remco Kouw: 2008-2024