known_hosts_bruteforcer
Tool and Usage
Project details
- License
- Custom license
- Programming language
- Perl
- Author
- Xavier Mertens
- Latest release
- 1.3
- Latest release date
Project health
Why this tool?
This utility is useful when you obtained a known_hosts file, but can't decipher the hashed hostnames from it.
How it works
The tool performs a brute force type of attack on the file by trying a set of hostnames and see if there is a match in the known_hosts file. Additionally, a domain name can be provided to try fully qualified domain names (FQDN) as well.
Usage and audience
known_hosts_bruteforcer is commonly used for digital forensics or penetration testing. Target users for this tool are forensic specialists, pentesters, and security professionals.
Tool review and remarks
The review and analysis of this project resulted in the following remarks for this security tool:
Strengths
- + The source code of this software is available
Weaknesses
- - No updates for a while
Installation
Supported operating systems
Known_hosts_bruteforcer is known to work on Linux.
known_hosts_bruteforcer alternatives
Similar tools to known_hosts_bruteforcer:
Crowbar
Crowbar is a brute forcing tool that can be used during penetration tests. Unlike other similar tools it uses different methods to achieve its goal.
Cowrie
Cowrie is a honeypot to emulate SSH and telnet services. It can be used to learn attack methods and as an additional layer for security monitoring.
Dockpot
Dockpot uses Docker containers and HonSSH to create on-demand SSH honeypots. It forwards traffic for analysis and learning about attack patterns.
This tool page was updated at . Found an improvement? Help the community by submitting an update.
Related tool information
Categories
This tool is categorized as a brute force tool.