http://libpcap.net/aimcrack/

how to use:
untar libfaim-snap.tar.gz
move the patch-* files into the libfaim directory
patch the source (patch -p0 < patch-*) and type `make`
copy faimtest (utils/faimtest/faimtest) in the same dir aimcrack.pl is located
run aimcrack.pl

this utility isn't the fastest way to crack AIM screenames, but since when has
brute-forcing been fast? :)

in a list of about 1,500 passwords, aimcrack took around 2 hours on a cable
modem connection. one cool feature is when aimcrack is back from it's timeout,
it will tell you what password it's currently trying.

aimcrack will load the dictionary file into an array, and append the screename
you're trying to crack onto the end of the array. the only check aimcrack does
while loading the list, is make sure the word being loaded is greater than
three chars. aimcrack will not filter out duplicates. that's what uniq(1) is
for.

you can adjust the timeout with the -t flag, but i don't recommend using
a timeout value below 5. A lower timeout value does ABSOLUTELY NOT mean
you'll be able to run through the dictionary list any faster. the default
timeout is 15 seconds.

oh, and a word of advice: i wouldn't run this from a permanent ip address. AOL
will definiately ban your IP from connecting to the AIM service if you keep
using this.

comments, suggestions, funny stories, AIM logs -> methodic[at]libpcap.net
