Summary

Having read this chapter, you will now understand how a basic brute force attack works against different applications. You should be able to adapt the examples given here to attack different protocols based on your needs.

Remember, these examples can be dangerous and potentially cause a denial of service, and it is not recommended that you run them against production services unless it is for the purpose of testing your brute force safeguards. Only perform these tests against services that you control, have permission to test, and understand the repercussions. You should never use these examples or these types of attacks against services you don't own, or you could break laws and land yourself in serious legal trouble.

There are fine ...

Get Security with Go now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.