Password Attacksbrute-forcefuzzingenumerationloginmulti-purpose

Patator

Patator is a multi-purpose brute-forcer with a modular design for flexible usage across various protocols and services. It supports modules for brute-forcing logins, enumerating users, fuzzing, and more.

Description

Patator is designed as a versatile tool for security testing, particularly brute-force attacks and service enumeration. Its modular architecture allows targeting numerous protocols including FTP, SSH, SMTP, HTTP, databases like MySQL and PostgreSQL, and others such as SNMP, RDP, and VNC. This makes it suitable for penetration testing scenarios where credential guessing or service probing is required.

Use cases include brute-forcing login credentials against remote services, enumerating valid users via SMTP VRFY/RELAY or Finger, fuzzing HTTP/AJP endpoints, and even cracking passwords on ZIP files or Java keystores. The tool's flexibility comes from its payload system, such as loading passwords from files, and options for ignoring specific responses to refine attacks.

It operates efficiently with statistics on hits, skips, and performance metrics, aiding testers in monitoring progress during large-scale attempts.

How It Works

Patator uses a modular system where each module handles a specific protocol or service, such as mysql_login for MySQL brute-forcing. It iterates through payloads like usernames or passwords from files (e.g., FILE0=/path/to/file), sending requests to targets specified by parameters like host=127.0.0.1 and user=root. Responses are parsed for success indicators, with options like -x ignore:fgrep='string' to skip matches on error messages such as 'Access denied for user'. It tracks metrics like hits, done, skip, fail, and rate in real-time.

Installation

bash
sudo apt install patator

Flags

-x ignore:fgrep='Access denied for user'Ignore responses containing the specified string using fgrep

Examples

Performs a MySQL brute force attack using root user and passwords from /root/passes.txt against localhost, ignoring 'Access denied for user' messages
patator mysql_login user=root password=FILE0 0=/root/passes.txt host=127.0.0.1 -x ignore:fgrep='Access denied for user'
Brute-force FTP login credentials
patator ftp_login
Brute-force SSH login credentials
patator ssh_login
Enumerate valid users using SMTP VRFY
patator smtp_vrfy
Brute-force or fuzz HTTP endpoints
patator http_fuzz
Brute-force the password of encrypted ZIP files
patator unzip_pass
Display help and list available modules
patator -h
Updated 2026-04-16kali.org ↗