Guide to using the Doona Bruteforce Exploit Detector Tool on Kali Linux
Kali Linux is one of the best-known hacking tool collections, and their website provides many how-to hacking links. Brute Force Attack: Brute Force, as the name itself, suggests means, “breaking into” or “cracking into” – is a method used by application programs. This is used to decode encrypted data such as passwords through repeated efforts. It is more of a trial and error method using force rather than using creative strategies. This method is used for cracking application proceeds through all possible permutations & combinations of legal characters in sequence. But the method is considered to be a time consuming one, but nevertheless a successful approach.
Doona Exploit Detector tool is a forked version of the Bruteforce Exploit Detection tool or simply termed as BED. The Bruteforce Exploit Detection tool is intended to control the daemons for potential buffer overflows, formatting the bugs in strings of the source code programs, etc.
Doona means a duvet in Australia. A Duvet is a soft pad filled with feathers, or a synthetic fiber, used instead of an upper sheet and blankets. Likewise, Doona tool adds a lot of new features and changes to the Bruteforce Exploiter Detector.
Steps to install Doona are as follows:
1. Type the below command in the terminal: Apt-get updateApt-get install doona
2. Then you need a target IP. For instance 188.8.131.52
3. Then you need to enter the whole command for attack
Command:- doona -m http -t -p -M 10 (max not after exit)
This is my command: – doona -m HTTP -t 184.108.40.206 -M 10
1.0 – New command line switches, more fuzz data and fuzz cases
0.9 – Bug fixes, more fuzz cases and new modules
0.8 – Bug fixes and more fuzz cases
0.7 – Multi-verb support, more fuzz cases and bug fixes
0.6 – First official Doona release
0.5 – Fork from BED
This is a free software and can be redistributed and modified.
This is possible as it functions under the terms and conditions of the GNU General Public License.
♣ Hacking Countermeasures: Fortunately, there are countermeasures that you can implement. Two of those are listed below:
♣ Hacking Exposed: Network Security Secrets & Solutions, by Joel Scambray. This book talks about security from an offensive point of view and includes an index of the weapons hackers uses. The readers of the book grasp the idea of what programs are available, what they can do, and thus, they ca benefit from the detailed explanations which otherwise the administrators do not understand in detail. Hacking Exposed helps in explaining what the best countermeasures should be which will render the treats useless and ineffective. The book features a detailed explanation of one OS at a time, and the author can tell users which UNIX files need to be altered, what Windows NT Registry keys need to be changed, and what settings need to be changed in NetWare.
♣ Wi-Foo: The Secrets of Wireless Hacking, by A. Vladimirov, K. Gavrilenko, and A. Mikhailovsky. This book was rudimentary and rational and talks about 802.11 network penetration testing and strengthening. This book is based on life experiences of breaking into and securing wireless LANs. Wi-Foo delivers a systematic approach to wireless security threats and the countermeasures that need to be implemented, rather than being a randomized collection of security news, tools, and methodologies. The book also helps in choosing the optimal encryption cypher for the particular network you are trying to protect.