phrasendrescher Package Description

phrasen|drescher (p|d) is a modular and multi processing pass phrase cracking tool. It comes with a number of plugins but a simple plugin API allows an easy development of new plugins. The main features of p|d are:

  • Modular with the use of plugins
  • Multi processing
  • Dictionary attack with or without permutations (uppercase, lowercase, l33t, etc.)
  • Incremental brute force attack with custom character maps
  • Runs on FreeBSD, NetBSD, OpenBSD, MacOS and Linux

Source: http://www.leidecker.info/projects/phrasendrescher/index.shtml
phrasendrescher Homepage | Kali phrasendrescher Repo

  • Author: Nico Leidecker
  • License: 3-clause BSD

Tools included in the phrasendrescher package

pd – Passphrase cracking tool
root@kali:~# pd -h
phrasen|drescher 1.2.2 - the passphrase cracker
Copyright (C) 2008 Nico Leidecker; http://www.leidecker.info

Usage: pd plugin [options]

 Available plugins:
   enc-file  mssql  pkey  http-raw  ssh

 General Options:
   h           : print this message
   v           : verbose mode
   i from[:to] : incremental mode beginning with word length `from'
                 and going to `to'
   d file      : run dictionary based with words from `file'
   w number    : number of worker threads (default is one)
   r rules     : specify rewriting rules for the dictionary mode:
                   A = all characters upper case
                   F = first character upper case
                   L = last character upper case
                   W = first letter of each word to upper case
                   a = all characters lower case
                   f = first character lower case
                   l = last character lower case
                   w = first letter of each word to lower case
                   D = prepend digit
                   d = append digit
                   e = 1337 characters
                   x = all rules

 Environment Variables:
   PD_PLUGINS : the directory containing plugins
                (current is /usr/lib/phrasendrescher)
   PD_CHARMAP : the characters for the incremental mode are
                taken from a character list. A customized list
                can be specified in the environment variable

pd Usage Example

Use the SSH brute force plugin (ssh) and the passwords in a wordlist (-d passes.txt) against the target server (-t 192.168.1.202), displaying verbose output (-v):

root@kali:~# pd ssh -d passes.txt -t 192.168.1.202 -v
phrasen|drescher 1.2.2 - the passphrase cracker
Copyright (C) 2008 Nico Leidecker; http://www.leidecker.info

[ssh] Trying host 192.168.1.202:22...
[ssh]   Fingerprint: C1 D3 4E 15 1F C0 EE 45 1A EC 7E EC D6 6A 02 7C
[ssh]   Authentication mechanisms: publickey,password (using: password)
[ssh] Complete List of targets:
[ssh]   192.168.1.202:22
[ssh] Users:
[ssh]   root

plugin ssh loaded. Running now (1 workers)...
--------------------------------------------------
mode: dictionary (passes.txt)
Menu