Webcracker 4.0


· Overview ·
· Origins ·
· Distribution ·
· Operation ·
· Detection and Removal ·
· Research ·



Overview

Summary:

With WebCracker one can test the safety of password-protected websites. This program takes advantage of some webservers' weaknesses (permitting numerous erroneous entries).

Vendor Notes:

From the doc: 'This program exploits a rather large hole in web site authentication methods. Password protected websites can be easily brute-force hacked, because there is no set limit on the number of time an incorrect password or User ID can be tried. Web Cracker was designed for Web Masters to test the vulnerability of their own sites. It SHOULD NOT be used by unauthorized persons to hack into web sites. Such use is ILLEGAL and could have SEVERE PENALTIES. Neither myself nor anyone involved with the development of Web Cracker will be liable for the misuse of this program. Use Web Cracker ONLY at your own risk, ONLY for lawful purposes, and ONLY on your own web site.'

Alias:

destructive program [F-Prot], Trj/WebCracker [Panda], WebCracker [McAfee]

Category:

Password Cracker: A tool to decrypt a password or password file. PestPatrol uses the term both for programs that take an algorithmic approach to cracking, as well as those that use brute force with a password cracking word list. Password crackers have legitimate uses by security administrators, who want to find weak passwords in order to change them and improve system security.

Trojan: Any program with a hidden intent. Trojans are one of the leading causes of breaking into machines. If you pull down a program from a chat room, new group, or even from unsolicited e-mail, then the program is likely trojaned with some subversive purpose. The word Trojan can be used as a verb: To trojan a program is to add subversive functionality to an existing program. For example, a trojaned login program might be programmed to accept a certain password for any user's account that the hacker can use to log back into the system at any time. Rootkits often contain a suite of such trojaned programs.

Similar Pests:

Password Cracker · Trojan

Origins

Author:

Daniel Flam

Date of Origin:

November, 1999

Distribution

Prevalence:

  • Webcracker 4.0: < 0.00005%
  • More Info

    Clot Factor:

  • Webcracker 4.0: 6
  • The "Clot Factor" is a measure of how much a pest "gums up" a machine by adding registry entries, files, and directories. As more objects are placed in a machine, manual removal becomes more difficult and more error-prone.

    Operation

    Storage Required:

  • Webcracker 4.0: at least 1525 KB
  • Detection and Removal

    Automatic Removal:

    PestPatrol detects this.

    PestPatrol removes this.



    Manual Removal:

    Follow these steps to remove Webcracker 4.0 from your machine. Begin by backing up your registry and your system, and/or setting a Restore Point, to prevent trouble if you make a mistake.
    Stop Running Processes:

    Kill these running processes with Task Manager:

    Remove Files:

    Remove these files (if present) with Windows Explorer:

    Research

    File Analyses:

    More Info:

  • AllTheWeb, AltaVista, AOL Search, Ask Jeeves, Google, HotBot, Lycos, LookSmart, MSN, Yahoo!
  • Research By:

  • PestPatrol's Pest Research Center
  • Last Revised:

    April 07, 2005