SHA1: 1789b14cd198340aa8a7242915a85347f5248007
A tool used by cybercriminals that exploit Linux.PNScan.1, Linux.BackDoor.Tsunami.133, and Linux.BackDoor.Tsunami.144. This malicious program targets Linux OSes and is designed to brute-force SMTP servers. For example, it can be employed as follows:
./smtp -b $1 -t 2000 -p 25 -user users -pass pass
Parameters are as follows:
- "-t"—maximum number of threads,
- "-p"—port,
- "-user"—path to the file with login list,
- "-pass"—path to the file with password list,
- "-b"—save the scan log to the file ("scan.log"),
- "$1"—path to the file with IP address list.
If authorization attempt is successful, login and password are saved to "sparte.txt".