Difference between revisions of "Brute-force attack"

From SFPTotal Wiki
Jump to: navigation, search
(How to use)
Line 6: Line 6:
  
 
== How to use ==
 
== How to use ==
# Read vendor code table
+
# Read a vendor code from transceiver (or use random code template)
# Change one or more bytes in the table
+
# Change at least one byte in the HEX grid. The code in software's window should be different than a code in transceiver's memory
 
# Open '''Scripts -> Brute-force password'''
 
# Open '''Scripts -> Brute-force password'''
 
# Set password Table and address (default, A2 and 7B)
 
# Set password Table and address (default, A2 and 7B)
Line 13: Line 13:
 
# Set additional options (if needed)
 
# Set additional options (if needed)
 
# Push '''Start''' button to begin brute-force attack
 
# Push '''Start''' button to begin brute-force attack
 
 
 
  
 
== Example ==
 
== Example ==
 
<youtube>https://www.youtube.com/watch?v=q04PfsST3Xk</youtube>
 
<youtube>https://www.youtube.com/watch?v=q04PfsST3Xk</youtube>

Revision as of 17:36, 26 July 2018

Brute-force-password.jpg
Brute-force.jpg

For password recovery SFPTotal Wizard supports a search function in brute force mode. This function could help if you need check passwords in a narrow range of values. Also, you can fast check a password for write-protected transceivers using a dictionary of passwords.

How to use

  1. Read a vendor code from transceiver (or use random code template)
  2. Change at least one byte in the HEX grid. The code in software's window should be different than a code in transceiver's memory
  3. Open Scripts -> Brute-force password
  4. Set password Table and address (default, A2 and 7B)
  5. Select range of password value
  6. Set additional options (if needed)
  7. Push Start button to begin brute-force attack

Example