home *** CD-ROM | disk | FTP | other *** search
/ Steganos Hacker Tools / SHT151.iso / programme / pw_online / brutus / SMTP_VRFY_User.bad < prev    next >
Encoding:
Brutus Application Definition  |  2002-02-03  |  2.3 KB  |  117 lines

  1. [Brutus Application Definition]
  2. Version=AET2
  3. Target=127.0.0.1
  4. Port=25
  5. UseUserID=0
  6. userprompt=login
  7. passprompt=passwd
  8. RespString=
  9. HTTPRequestType=POST
  10. useHTTPKeepAlive=1
  11. posResponse=0
  12. IsTelnet=0
  13. IsHTTP=0
  14. IsSMB=0
  15. maPrimaryResponseIsPositive=0
  16. maSecondaryResponseIsPositive=0
  17. maPrimaryResponseAction=13
  18. maSecondaryResponseAction=13
  19. maUserPrefix=""
  20. maUserPostfix=""
  21. maPassPrefix="VRFY "
  22. maPassPostfix=""
  23. maUsePreAuth=1
  24. maMaxAuthsConx=0
  25. HTTPFormFieldUpdate=0
  26. HTTPUseCookies=1
  27. HTTPCookieUpdate=1
  28. HTTPReferer=
  29. CookieNames1=
  30. CookieValues1=
  31. CookieNames2=
  32. CookieValues2=
  33. CookieNames3=
  34. CookieValues3=
  35. CookieNames4=
  36. CookieValues4=
  37. maauthStageStrings1=""
  38. maauthReadLength1=1
  39. maauthSendPostfix1=None
  40. HTTPFormFields1=
  41. HTTPFormFieldValues1=
  42. maauthStageStrings2="220"
  43. maauthReadLength2=1
  44. maauthSendPostfix2=None
  45. HTTPFormFields2=
  46. HTTPFormFieldValues2=
  47. maauthStageStrings3="HELO ."
  48. maauthReadLength3=1
  49. maauthSendPostfix3=CR+LF
  50. HTTPFormFields3=
  51. HTTPFormFieldValues3=
  52. maauthStageStrings4=""
  53. maauthReadLength4=1
  54. maauthSendPostfix4=None
  55. HTTPFormFields4=
  56. HTTPFormFieldValues4=
  57. maauthStageStrings5=""
  58. maauthReadLength5=1
  59. maauthSendPostfix5=None
  60. HTTPFormFields5=
  61. HTTPFormFieldValues5=
  62. maauthStageStrings6=""
  63. maauthReadLength6=1
  64. maauthSendPostfix6=None
  65. HTTPFormFields6=
  66. HTTPFormFieldValues6=
  67. maauthStageStrings7=""
  68. maauthReadLength7=1
  69. maauthSendPostfix7=None
  70. HTTPFormFields7=
  71. HTTPFormFieldValues7=
  72. maauthStageStrings8=""
  73. maauthReadLength8=1
  74. maauthSendPostfix8=None
  75. HTTPFormFields8=
  76. HTTPFormFieldValues8=
  77. maauthStageStrings9=""
  78. maauthReadLength9=1
  79. maauthSendPostfix9=None
  80. HTTPFormFields9=
  81. HTTPFormFieldValues9=
  82. maauthStageStrings10=""
  83. maauthReadLength10=1
  84. maauthSendPostfix10=None
  85. HTTPFormFields10=
  86. HTTPFormFieldValues10=
  87. maauthStageStrings11=""
  88. maauthReadLength11=1
  89. maauthSendPostfix11=None
  90. HTTPFormFields11=
  91. HTTPFormFieldValues11=
  92. maauthStageStrings12="250"
  93. maauthReadLength12=1
  94. maauthSendPostfix12=None
  95. HTTPFormFields12=
  96. HTTPFormFieldValues12=
  97. maauthStageStrings13=""
  98. maauthReadLength13=1
  99. maauthSendPostfix13=CR+LF
  100. HTTPFormFields13=
  101. HTTPFormFieldValues13=
  102. maauthStageStrings14="550"
  103. maauthReadLength14=1
  104. maauthSendPostfix14=None
  105. HTTPFormFields14=
  106. HTTPFormFieldValues14=
  107. maauthStageStrings15="252"
  108. maauthReadLength15=1
  109. maauthSendPostfix15=None
  110. HTTPFormFields15=
  111. HTTPFormFieldValues15=
  112. maauthStageStrings16=""
  113. maauthReadLength16=1
  114. maauthSendPostfix16=None
  115. HTTPFormFields16=
  116. HTTPFormFieldValues16=
  117.