Services supported:
- HashiCorp Vault Userpass
- etcd v3
- AMQP PLAIN SASL
Brutemq was a tool initially designed to brute force rabbitmq (amqp) queue messaging services. After implementing the first working version, new needs arose and etcd and HashiCorp Vault Userpass services were added.
You can compile the binary or run via OCI image.
-
Requirements:
- A version of Docker with BuildKit support.
- GNU make utility.
-
Procedure:
- Run:
make
. - Check the correct creation of
dist
directory.
- Run:
$ docker run --net=host ghcr.io/codexlynx/brutemq:latest
Add to your shell profile:
function brutemq {
docker run --net=host ghcr.io/codexlynx/brutemq:latest $@
}
Or
alias brutemq='docker run --net=host ghcr.io/codexlynx/brutemq:latest'
For more details click here.
Set WEBHOOK_URL
environment variable to send an http webhook request when the password is discovered.
You can launch brutemq on a Kubernetes cluster for various reasons, either because you can't set up port-forwarding and
want to attack an endpoint on one of the cluster's internal networks (lack of permissions in RBAC or other limitations)
or simply because you want to manage the workload on your own cluster. Check the deployments
directory and set the
manifest to your needs.
brutemq - An exotic service bruteforce tool
Usage:
brutemq [command]
Available Commands:
amqp Bruteforce AMQP PLAIN SASL service endpoint
completion Generate the autocompletion script for the specified shell
etcd Bruteforce etcdv3 service endpoint
help Help about any command
vault Bruteforce HashiCorp Vault Userpass auth
Flags:
-d, --dictionary string dictionary file path
-h, --help help for brutemq
-t, --threads int threads number (default 100)
Use "brutemq [command] --help" for more information about a command.
$ brutemq amqp -d passwords.txt -u admin -e localhost:5672/ -t 500