

In “Authenticacions Options” There are several options, let us begin: If you do not know the Usermane the victim either to try to hack into HTML, Telnet, FTP, etc. I think there is little to explain, in “Proxy Type” you have to select the type of proxy, In “Proxy Address” IP or failing the proxy host and “Proxy Port” the port number that you connect remembering that, If you scan HTTP (Basic authentication) or you have to use HTTP port 80 or 8080 and if you scan, FTP, Telnet, etc. He “Use proxy” SOCKS proxies is to use when making the cracking see this image: In “Port”, You not have to pay much attention, since selecting the “Type” you want to change only, If you select Telnet port will automatically 23 and so on with all. In “Type” identifying the type of car that you are craquear is selected and we have already seen above all the guys there so needless to explain again the. In “Target” It serves to Target class we want ie the IP craquear, if HTML will type the URL and the program become IP, Also happen if we put a FTP we will crack. In “Tools”, Word List Generator find that serves as its name suggests to generate, manage and optimize your Word List (lista de password). Save Session serves to save the session that we are running and can return to it whenever we want, Restore Last serves to restore everything before we find elected. Load Session, It used to load a session to stop half. Export Service, It used to export if you have any new service for the program. Then explain what each section of the program: In “File” if we give we get a pop-up window with several options, Import Service, which it serves to import any services not included in the program as…HTTP (Basic authentication), HTTP (HTML Form/CGI), POP3, Ftp, SMB, Telnet, IMAP, NNTP, NetBus etc. HOW TO START A CRACK The first thing to do is open the Brutus AET2, and a window like this will appear: 24 Mb RAM, 5MB free on your HD (hard disk) and clear Internet connection. System Requirements: Windows 95, Windows 98, Windows NT 4 o Windows 2000. And this version contains these functions: gradual authentication engine, 60 simultaneous connections per target, no username, single and multiple modes username username, Password List, combo list (user/password) and configurable modes of brute force, highly configurable authentication sequences, Import and export custom types as BAD authentication files seamlessly, SOCKS proxy to use for each session, The user and password lists functionality generation and manipulation, The HTML form interpretation for the types of authentication Form HTML / CGI, To save the session cracking and can return to it when desired.

It is quite fast and very easy to handle, the pass that can crack are : HTTP (Basic authentication), HTTP (HTML Form/CGI), POP3, Ftp, SMB, Telnet, other types such as IMAP, NNTP, NetBus etc.
