Solved

SSH Password Cracking Tool

Posted on 2008-10-21
4
1,617 Views
Last Modified: 2013-12-17
I have a bluetooth marketing box that is running on TS-Linux. I want to be able to ssh into the box but I do not know the username/password (I presume the user is root). Is there any software to crack the SSH username/password?

Also does anyone know if any free/cheap bluetooth marketing software that would run on a ARM single board computer?

Thanks

Ben
0
Comment
Question by:souldigital
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 88

Accepted Solution

by:
rindi earned 500 total points
ID: 22773855
If such a tool existed, it could be used for malicious purposes, and therefore this isn't supported on this site. I suggest you get in touch with the manufacturer of that box and ask them for details so you stay legal and conform to the EE rules.
0
 

Author Comment

by:souldigital
ID: 22774354
I am sure one does exsist but I do not know where I would find it. It is not going to be used for "malicious purposes" so any help would be appreciated. I would ask the manufacturer, but they have gone bust so that would be a bit tricky.

Any ideas on cheap/free software that will work on ARM single computer boards?
0
 
LVL 88

Expert Comment

by:rindi
ID: 22774838
As mentioned above, we aren't allowed to post such info, even if we knew where to find it. It is still best to get in touch with the manufacturer of the product.

As for the 2nd Q, Check on Linux versions that run on ARM processors.

http://www.debian.org/ports/arm/
http://www.arm.com/products/os/linux_download.html
0
 
LVL 16

Expert Comment

by:ai_ja_nai
ID: 22805229
Fortunately, it's almost impossible break an encrypted ssh password or crack a ssh criptography. I say _almost_ because its invulnerability has not been mathematically demonstrated; but to crack a rsa key via brute attack you need such a computing power that only NASA can provide.
So, my answer is: no, that doesn't exist
0

Featured Post

Salesforce Made Easy to Use

On-screen guidance at the moment of need enables you & your employees to focus on the core, you can now boost your adoption rates swiftly and simply with one easy tool.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

For Sennheiser, comfort, quality and security are high priority areas. This paper addresses the security of Bluetooth technology and the supplementary security that Sennheiser’s Contact Center and Office (CC&O) headsets provide.  
Ever wonder what it's like to get hit by ransomware? "Tom" gives you all the dirty details first-hand – and conveys the hard lessons his company learned in the aftermath.
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…

626 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question