WWWThief3.gif (2165 bytes)
NPS Software

WWWBandit Online Manual

WWWBandit is the definite choice for putting the security of your web sites to the test.

Visit the WWWBandit web site and order now !

Quick start

Read the WWWBandit FAQ


Important notice

You should read the License Agreement.
This program may only be used for testing the security of your own web sites.
This program may NOT be used to gain illegal access to secure systems or web sites.


WWWBandit's outstanding features

  • Intelligent and random attacks
  • Attack up to 4 sites in a single session
  • Lightning fast access times (1500+ requests per minute)
  • Special stealth mode
  • Clear monitoring of  the progress of the attack
  • Use up to 30 anonymous http proxy servers per attack
  • Save and open sessions
  • Configurable list of found users
  • User friendly interface
  • Manage your user and password files
  • Automatically  start browser on success
  • Detailed html log of the current attack session
 



WWWThief1.gif (2478 bytes)


System requirements

Windows 95/98/NT or higher.


Toolbar

Toolbar.gif (2905 bytes)


File menu

Menu1.gif (2183 bytes)

Adding sites to a session

When you enter the URL of a secure site into your browser, most of the time you are prompted for your username and password in a message box similar to the one below. The URL that pops up this message box, is the one you should provide WWWBandit with.

Login.gif (3206 bytes)

When you add a site, WWWBandit will check whether the site is indeed secure. If necessary, WWWBandit will attempt to correct the given URL.

You can attack up to 4 secure sites in a single session.

All attack options can be set independently for each site you add to the attack list.

General attack options

For the Attack Method, you can choose from the standard request methods : HEAD, GET and POST. In most cases, the HEAD method will be your best choice.

You can add a description of the site in the Comment textbox. This  comment will be shown during the attack and also in the Found Users dialog.

When you uncheck Stop After One Hit, WWWBandit will continue his search for users until there are no more requests.

The minimum and maximum lengths for the usernames and passwords range between 1 and 24 characters.

Intelligent.gif (891 bytes) Intelligent Session

IntelligentSession.gif (11171 bytes)

This is the preferred way for attacking a secure site and offers the most chances of success.

Usernames
Here you can specify a list of usernames to be used for the attack. This list will also be used to derive the intelligent passwords as described hereafter.

Click on BrowseButton.gif (900 bytes) to browse to the desired paddings file.

Paddings
When the username is shorter than the minimal password length, the username will be padded up to the minimal password length with the strings provided in the paddings file.

Suppose the minimum password length is 6 characters, the username is john and the padding strings are '123456', 'xxxxx' and 'qwerty' then the resulting passwords would be 'john12', johnxx' and 'johnqw'.

Click on BrowseButton.gif (900 bytes) to browse to the desired paddings file.

Common Passwords
Here you can specify a file of passwords that would be appropriate for the type of site.

Click on BrowseButton.gif (900 bytes) to browse to the desired paddings file.

Same As Username
When you check this option, the username will also be used as one of the passwords.

Reverse Username
When you check this option, the reversed username will also be used as one of the passwords.

e.g. 'nhoj' for 'john', 'dranoel' for 'leonard', 'ruhtra' for 'arthur', etc.

Add Numbers To Username
When you check this option, WWWBandit will create passwords by adding the range of numbers specified in the two textboxes to the username.

Suppose the username is 'john' and the range is 1 to 3, the resulting passwords would be 'john1', 'john2' and 'john3'.

Associations
Here you can specify a file with combinations of usernames and passwords to be used in the attack. Each line of this file should contain a single combination in the form 'username:password'.

e.g. 'adam:eve', 'laurel:hardy', 'ginger:fred', etc.

Click on BrowseButton.gif (900 bytes) to browse to the desired paddings file.

Random.gif (904 bytes) Random Session

RandomSession.gif (8876 bytes)

Although it is highly unlikely  that you'll ever gain access to a secure site by trying random combinations, this type of attack can give you a deeper insight into the different possibilities of a brute-force attack.

In Number Attempts you can specify how many requests (1 to 999,999,999) WWWBandit should send.

Usernames and passwords may be composed of any combinations of upper and lower case letters, digits and symbols (, . : ; ? ! # $ % & + - * = < > { } [ ] ~ | ^ _). Just check the appropriate options for the usernames and passwords.

Open.gif (885 bytes) Open Session

When opening a session, you can either continue the attack immediately or edit the session in the new session dialog. To specify the desired action, select the appropriate radio button.

Save.gif (882 bytes) Save Session

Sessions are saved at the current attack position. When an attack is complete, the session is saved at the beginning in order to retry it on another occasion.

Attack menu

Menu2.gif (1741 bytes)

Start.gif (862 bytes) Start

Start the attack after creating a new intelligent or random session or opening a session.

Pause.gif (867 bytes) Pause/Resume Resume.gif (871 bytes)

Pause or resume the current attack.

Stop.gif (868 bytes) Stop

Stop the current attack.

Log.gif (903 bytes) Current Attack Log

After setting up a session, you can review the attack options at any time.

Options menu

Menu3.gif (1525 bytes)

Proxies

You can specify up to 30 different proxies through which WWWBandit can send the requests. The use of anonymous proxies can fool the server under attack into believing the requests are coming from all over the world. You can automatically update your proxies by clicking Update in the proxies dialog.

Agents

Agents are randomly chosen for each new request. This mechanism makes it possible to pretend the requests are coming from different applications (e.g. Netscape, IE, Mozilla, etc.). You can add as many agents as you want.

General Options

By checking Update Proxies On Startup, WWWBandit updates the proxies each time the program starts up.

By checking Log Session, a detailed html log is created for the current session. The log is formatted as follows: URL of the secure site, username:password combination, proxy and returned status code. The colors used for the status codes are: green for OK (200), red for Unauthorized (401) and yellow for all other status codes (e.g. Bad Request (400), Forbidden (403), Not Found (404), etc.). The log is overwritten for each new session.

By checking Stealth Mode, WWWBandit conceals the attack by sending the requests sequentially. Before starting a stealth mode session, the program will benchmark the available proxies and pick the best one for the attack. This mode should only be used when a massive attack results in reporting fake users.
By checking Start Browser On Success, WWWBandit starts your default browser when a new user is found.
By checking Play Sound On Success, a sound is played to announce a new found user.
By checking Retry After Complete Timeout, the program will start resending requests after all proxies have timed out.
By adjusting the slider Refresh Rate Individual Site Info, you can determine the display rate in seconds for the different sites.

Tools menu

Menu4.gif (1533 bytes)

FoundUsers.gif (886 bytes) Found Users

When a user is found, he is automatically added to the list of found users.  In the upper listbox, you see the URLs of the cracked sites. When selecting a site, its users appear in the lower listbox. In order to visit a site,  click Visit Site or double-click the site or one of its users. To remove a user, click Remove. To remove a site, remove all its users. At any time you can change the comment pertaining to the site.

Merge/Sort Files

This handy feature allows you to manage your user and password files. You can merge files, remove duplicates and sort them alphabetically.

Help menu

Menu5.gif (1947 bytes)

License Agreement

You must read the license agreement and accept all its terms in order to be able to use WWWBandit.

Caddy.gif (872 bytes) Order Now !

This demo version of WWWBandit will expire after 3 successful attempts. After the demo has expired, you can still use some of its  features but you won't be able to start new attacks. Once registered, you will be able to enjoy WWWBandit again to its full extent. On ordering, be sure to supply the exact (you can use copy and paste) 12-character Program Code you can find in the registration dialog (see below). After registering, you will be given a Registration Code to unlock the program.

Register

Register.gif (2872 bytes)

To register, just paste the supplied Registration Code into the appropriate textbox and click Register.

Copyright  ⌐ 1999, NPS Software