~00000 00000000 ,000$ 0$+~ $=0= .0+0 000 000 :000 0~0 0000. 0 00000 . .000000 0?= +.,. ,?00.$000 00000~.:~0 .$+00~?~000 :00000.=0000 ?00?00+=: ,0, 00000..0000~ 000000. $0 00..0~0?0::00,?0::?$0. 00 ~ .0. ,0?00000.0$,+,000.00 $00 0. 00.?00=00000~0+0:0000?0,~0?. .0 +00 0+0000 0000=?~0000?00 00 .: .~~ .000=00000~00=000000+0.0~0$$. 00 , ?00.. 000~000000000000.:0.0:0~ 0$00.+ 00.0 00 00?~000~000000000+00 + ~0000000000=$0000 $ 00 00. .00,000000000000$.00000. .0000+$+~00 0 00 .0 000000000?~0000000. 0. .0$000000+$0 0 0 0 000:$~0000=0.0000,$. 00 0000000000 0 00 ?.0000 $0 0 . .0000 . $ ?000. 0 0 0 +~?000 0. :000000?0 |=------=[ Ncrack ]=------=| 0000$?+00 00+0:~0$0+ .0$000?00 0?000000 .000~0 -- [ Ncrack Changelog ] -- Ncrack 0.4ALPHA [2011-04-23] o Added the VNC module to Ncrack's arsenal. Thanks to rhh of rycon.hu for implementing the module and discussing about it for further improvement. o Wrote the Ncrack Developer's Guide, which is meant to give an overall insight into Ncrack's architecture and help programmers develop their own modules (http://nmap.org/ncrack/devguide.html) o Fixed critical bug in RDP module, which caused Ncrack to fail cracking some Windows 2003 server versions. o Added a mechanism (MODULE_ERR), which modules can use to report to the Ncrack engine that the authentication wasn't completed due to an application error. For instance, the VNC server often notifies the client that there are "too many authentication failures" and Ncrack can then close the running connections and wait some time until the above wears off. o Ncrack can now print the nsock EID (unique connection ID) in debugging messages. This will greatly help us track problems, since error messages will be matched to certain connections. Ncrack 0.3ALPHA [2010-09-07] o Ncrack can now crack the Remote Desktop Protocol on all Windows versions from XP and above, with the introduction of the RDP module. Users are well advised to read http://seclists.org/nmap-dev/2010/q3/450 for cracking Windows XP machines since they can't handle many concurrent RDP connections. o Implemented the SMB module which can crack Microsoft's SMB/CIFS services as well as UNIX Samba servers. o Introduced the '-f' option, which forces Ncrack to quit cracking a service after it finds one credential for it. Specifying the option twice like '-f -f' will cause Ncrack to completely quit after any credential is found on any service. o Added support for blank-password testing. Ncrack will now test a blank entry whenever it sees an empty line in any of the wordlists. The same behaviour applies for passing the options --user '' or --pass ''. o Improved the Ncrack scorpion logo with an updated SVG version (see the top of http://nmap.org/ncrack/) Ncrack 0.2ALPHA [2010-06-12] o Ncrack now interactively prints out discovered credentials whenever the user presses the 'p' key. Also, in verbose mode (-v), Ncrack now prints new credentials whenever they are discovered. Basic statistics (cracking rate, number of credentials found, but not the credentials themselves) can be obtained by pressing enter or another key at any time. o Added the --resume option, which allows users to cancel (usually by pressing Ctrl+C) and later restore a cracking session through a file with the saved state. The Ncrack restoration file is saved at .ncrack/ under the home user's directory for *nix systems and inside the user's profile directory (normally under C:\Documents and Settings\\.ncrack\) in Windows. The file name format is restore._