#brute-force #word-list #tcp-port #port-scanning #scylla-db

app legba

A fast multi protocol credential bruteforcer/sprayer/enumerator

12 releases (breaking)

1.0.0 Oct 23, 2023
0.9.0 May 28, 2024
0.8.0 Jan 30, 2024
0.7.1 Dec 18, 2023
0.6.1 Nov 28, 2023

#180 in Authentication

Download history 8/week @ 2024-07-20 11/week @ 2024-07-27 7/week @ 2024-08-03 1/week @ 2024-08-10 2/week @ 2024-08-24 5/week @ 2024-08-31 16/week @ 2024-09-07 12/week @ 2024-09-14 50/week @ 2024-09-21 39/week @ 2024-09-28 16/week @ 2024-10-05 19/week @ 2024-10-12 15/week @ 2024-10-19 7/week @ 2024-10-26 12/week @ 2024-11-02

54 downloads per month

GPL-3.0 and maybe AGPL-3.0

370KB
7.5K SLoC

Release Crate Docker Hub Rust Report Software License

Legba is a multiprotocol credentials bruteforcer / password sprayer and enumerator built with Rust and the Tokio asynchronous runtime in order to achieve better performances and stability while consuming less resources than similar tools (see the benchmark below).

For the building instructions, usage and the complete list of options check the project Wiki.

Supported Protocols/Features:

AMQP (ActiveMQ, RabbitMQ, Qpid, JORAM and Solace), Cassandra/ScyllaDB, DNS subdomain enumeration, FTP, HTTP (basic authentication, NTLMv1, NTLMv2, multipart form, custom requests with CSRF support, files/folders enumeration, virtual host enumeration), IMAP, Kerberos pre-authentication and user enumeration, LDAP, MongoDB, MQTT, Microsoft SQL, MySQL, Oracle, PostgreSQL, POP3, RDP, Redis, Samba, SSH / SFTP, SMTP, Socks5, STOMP (ActiveMQ, RabbitMQ, HornetQ and OpenMQ), TCP port scanning, Telnet, VNC.

Benchmark

Here's a benchmark of legba versus thc-hydra running some common plugins, both targeting the same test servers on localhost. The benchmark has been executed on a macOS laptop with an M1 Max CPU, using a wordlist of 1000 passwords with the correct one being on the last line. Legba was compiled in release mode, Hydra compiled and installed via brew formula.

Far from being an exhaustive benchmark (some legba features are simply not supported by hydra, such as CSRF token grabbing), this table still gives a clear idea of how using an asynchronous runtime can drastically improve performances.

Test Name Hydra Tasks Hydra Time Legba Tasks Legba Time
HTTP basic auth 16 7.100s 10 1.560s (🚀 4.5x faster)
HTTP POST login (wordpress) 16 14.854s 10 5.045s (🚀 2.9x faster)
SSH 16 7m29.85s * 10 8.150s (🚀 55.1x faster)
MySQL 4 ** 9.819s 4 ** 2.542s (🚀 3.8x faster)
Microsoft SQL 16 7.609s 10 4.789s (🚀 1.5x faster)

* While this result would suggest a default delay between connection attempts used by Hydra. I've tried to study the source code to find such delay but to my knowledge there's none. For some reason it's simply very slow.
** For MySQL hydra automatically reduces the amount of tasks to 4, therefore legba's concurrency level has been adjusted to 4 as well.

License

Legba is released under the GPL 3 license. To see the licenses of the project dependencies, install cargo license with cargo install cargo-license and then run cargo license.

Dependencies

~38–81MB
~1.5M SLoC