known_hosts_bruteforcer

LSE toolsLSE toolsknown_hosts_bruteforcer (248)known_hosts_bruteforcer (248)

Tool and Usage

Project details
LicenseCustom license
Programming languagePerl
AuthorXavier Mertens
Latest release1.3 []

Project health

74
This score is calculated by different factors, like project age, last release date, etc.

Why this tool?

This utility is useful when you obtained a known_hosts file, but can't decipher the hashed hostnames from it.

How it works

The tool performs a brute force type of attack on the file by trying a set of hostnames and see if there is a match in the known_hosts file. Additionally, a domain name can be provided to try fully qualified domain names (FQDN) as well.

Usage and audience

known_hosts_bruteforcer is commonly used for digital forensics or penetration testing. Target users for this tool are forensic specialists, pentesters, and security professionals.

Tool review and remarks

The review and analysis of this project resulted in the following remarks for this security tool:

Strengths

  • + The source code of this software is available

Weaknesses

  • - No updates for a while

Author and Maintainers

Known_hosts_bruteforcer is under development by Xavier Mertens.

Installation

Supported operating systems

Known_hosts_bruteforcer is known to work on Linux.

known_hosts_bruteforcer alternatives

Similar tools to known_hosts_bruteforcer:

60

Crowbar

Crowbar is a brute forcing tool that can be used during penetration tests. Unlike other similar tools it uses different methods to achieve its goal.

93

Cowrie

Cowrie is a honeypot to emulate SSH and telnet services. It can be used to learn attack methods and as an additional layer for security monitoring.

56

Dockpot

Dockpot uses Docker containers and HonSSH to create on-demand SSH honeypots. It forwards traffic for analysis and learning about attack patterns.

All known_hosts_bruteforcer alternatives

Found an improvement? Help the community by submitting an update.

Related tool information

Categories

This tool is categorized as a brute force tool.

Related terms