home *** CD-ROM | disk | FTP | other *** search
/ Steganos Hacker Tools / SHT151.iso / programme / pw_online / brutus / NNTP-Authentication.bad < prev    next >
Encoding:
Brutus Application Definition  |  2002-02-03  |  2.3 KB  |  117 lines

  1. [Brutus Application Definition]
  2. Version=AET2
  3. Target=127.0.0.1
  4. Port=119
  5. UseUserID=1
  6. userprompt=
  7. passprompt=
  8. RespString=
  9. HTTPRequestType=POST
  10. useHTTPKeepAlive=0
  11. posResponse=0
  12. IsTelnet=0
  13. IsHTTP=0
  14. IsSMB=0
  15. maPrimaryResponseIsPositive=0
  16. maSecondaryResponseIsPositive=1
  17. maPrimaryResponseAction=0
  18. maSecondaryResponseAction=0
  19. maUserPrefix="AUTHINFO USER "
  20. maUserPostfix=""
  21. maPassPrefix="AUTHINFO PASS "
  22. maPassPostfix=""
  23. maUsePreAuth=0
  24. maMaxAuthsConx=0
  25. HTTPFormFieldUpdate=0
  26. HTTPUseCookies=1
  27. HTTPCookieUpdate=1
  28. HTTPReferer=
  29. CookieNames1=
  30. CookieValues1=
  31. CookieNames2=
  32. CookieValues2=
  33. CookieNames3=
  34. CookieValues3=
  35. CookieNames4=
  36. CookieValues4=
  37. maauthStageStrings1=""
  38. maauthReadLength1=1
  39. maauthSendPostfix1=None
  40. HTTPFormFields1=
  41. HTTPFormFieldValues1=
  42. maauthStageStrings2=""
  43. maauthReadLength2=1
  44. maauthSendPostfix2=None
  45. HTTPFormFields2=
  46. HTTPFormFieldValues2=
  47. maauthStageStrings3=""
  48. maauthReadLength3=1
  49. maauthSendPostfix3=None
  50. HTTPFormFields3=
  51. HTTPFormFieldValues3=
  52. maauthStageStrings4=""
  53. maauthReadLength4=1
  54. maauthSendPostfix4=None
  55. HTTPFormFields4=
  56. HTTPFormFieldValues4=
  57. maauthStageStrings5=""
  58. maauthReadLength5=1
  59. maauthSendPostfix5=None
  60. HTTPFormFields5=
  61. HTTPFormFieldValues5=
  62. maauthStageStrings6=""
  63. maauthReadLength6=1
  64. maauthSendPostfix6=None
  65. HTTPFormFields6=
  66. HTTPFormFieldValues6=
  67. maauthStageStrings7=""
  68. maauthReadLength7=1
  69. maauthSendPostfix7=None
  70. HTTPFormFields7=
  71. HTTPFormFieldValues7=
  72. maauthStageStrings8=""
  73. maauthReadLength8=1
  74. maauthSendPostfix8=None
  75. HTTPFormFields8=
  76. HTTPFormFieldValues8=
  77. maauthStageStrings9=""
  78. maauthReadLength9=1
  79. maauthSendPostfix9=None
  80. HTTPFormFields9=
  81. HTTPFormFieldValues9=
  82. maauthStageStrings10="200"
  83. maauthReadLength10=1
  84. maauthSendPostfix10=None
  85. HTTPFormFields10=
  86. HTTPFormFieldValues10=
  87. maauthStageStrings11=""
  88. maauthReadLength11=1
  89. maauthSendPostfix11=CR+LF
  90. HTTPFormFields11=
  91. HTTPFormFieldValues11=
  92. maauthStageStrings12="381"
  93. maauthReadLength12=1
  94. maauthSendPostfix12=None
  95. HTTPFormFields12=
  96. HTTPFormFieldValues12=
  97. maauthStageStrings13=""
  98. maauthReadLength13=1
  99. maauthSendPostfix13=CR+LF
  100. HTTPFormFields13=
  101. HTTPFormFieldValues13=
  102. maauthStageStrings14="502"
  103. maauthReadLength14=1
  104. maauthSendPostfix14=None
  105. HTTPFormFields14=
  106. HTTPFormFieldValues14=
  107. maauthStageStrings15="281"
  108. maauthReadLength15=1
  109. maauthSendPostfix15=None
  110. HTTPFormFields15=
  111. HTTPFormFieldValues15=
  112. maauthStageStrings16=""
  113. maauthReadLength16=1
  114. maauthSendPostfix16=None
  115. HTTPFormFields16=
  116. HTTPFormFieldValues16=
  117.