Skip to main content

Building Password dictionary

file 4.2, 25.40 minute

tested...
#cewl www.ignitetechnologies.in -d 2 -w /root/Desktop/dict.txt

  • cewl <url> -d<depth> -w<path>
  • Cewl – indicated the tool which is being used
  • <url> – here give the URL that you want to use as a foundation of your dictionary.
  • -d<depth> – here, give the number of links you want it to go through while creating your dictionary.
  • -w<path> – here, give the path where you want to store all the possible passwords.
  • For example in the terminal of kali type :[source: http://www.hackingarticles.in/5-ways-create-dictionary-bruteforcing/]

$ mkdir /tmp/source
$ cd /tmp/soruce
$ wget -r -1 [N] [target_website]
$ cd..
$ grep -h -r "" source | tr '[:space:]' '\n' | sort | uniq > wordlist.lst
$ grep -v '<' wordlst.lst > newlist.lst

-r pulls recursive pages from the target website, following links to a depth of N (-1) pages.
grep to omit file names  from the output (-h) while recursive going thru all subdirectories (-r) searching for files with any data in them "" in the source directory. Take those results and use tr to change spaces into carriage return. Sort the results and pull out unique  words, and store the results in wordlist.lst.
---------------------------------------------------------------------------------------------------
free dictionary generator tool at www.fonlow.com/zijianhuang/kpa runs on windows
---------------------------------------------------------------------------------------------------
$ cat worldlist.txt | sort | uniq > dictionary.txt

eliminate duplicate words from a file involves "uniq" command, which removes redudant words from a sorted file.
---------------------------------------------------------------------------------------------------
$wc -l password.lst
counts the list of password in the password.lst
---------------------------------------------------------------------------------------------------
$ cat password.lst | pw-inspector -m 6 -n -u -l  -c 2 | wc -l      OR
$ cat password.lst | pw-inspector -m 6 -n -u -l  -c 2 >  newpassword.lst
pw-inspector allows you to customize the password file based on the org poilicy so if the company has a policy for pwd length=9, your list shouldnt have any character less than 9
m 6= min pwd length is 6
n = pwd must contains atleast 1 number
u = pwd must contains atleast upper case
l = pwd must contains atleast lower case
c 2 = minimum number of criteria required in each password crieria mentioned above is 2
---------------------------------------------------------------------------------------------------
use cewl @ http://nagpentest.blogspot.com/2018/04/vmw-fristileaks-13-base64-encodedecode.html
------------

Comments

Popular posts from this blog

28 VM SecOS-1

Walkthru: Notes: A. https://c0d3g33k.blogspot.com/2017/01/secos.html [capture admin cookie using 127.0.0.1 in a code  test.html  with cross site scripting vulnerability,  CSRF attack, use exploit 37088 for priv escalation ] B. http://oldsmokingjoe.blogspot.com/2016/01/walkthrough-secos-1.html [ Hacking Node.js and MangoDB   ] c. http://oldsmokingjoe.blogspot.com/2016/01/walkthrough-secos-1.html [use wget to post data from CLI. Add other cmds to ping cmd using curl and wget] D. https://chousensha.github.io/blog/2015/02/04/pentest-lab-secos/ [SSH tunnel so we can access the ping site from Kali and dont have to pass via CLI] Notes: # Nmap 7.70 scan initiated Thu Jul 19 09:26:05 2018 as: nmap -sV -O -oN ../reports/192.168.117.6/192.168.117.6.nmap 192.168.117.6 Nmap scan report for 192.168.117.6 Host is up (0.00042s latency). Not shown: 998 closed ports PORT     STATE SERVICE VERSION 22/tcp   open  ssh  ...

VM 9 : PHP Include And Post Exploitation

Walkthrough 1.        https://medium.com/@Kan1shka9/pentesterlab-php-include-and-post-exploitation-walkthrough-8a85bcfa7b1d 2.        Ine [] 3.        http://megwhite.com.au/pentester-lab-bootcamp-walkthrough-php-include-post-exploitation/ 4.        http://fallensnow-jack.blogspot.com/2014/07/pentester-lab-php-lfi-post-exploitation.html Notes: root@kali:~# nmap 10.0.0.12 Starting Nmap 7.40 ( https://nmap.org ) at 2017-05-30 12:23 EDT Nmap scan report for 10.0.0.12 Host is up (0.00035s latency). Not shown: 999 filtered ports PORT    STATE SERVICE 80/tcp open   http MAC Address: 08:00:27:1F:12:24 (Oracle VirtualBox virtual NIC) Nmap done: 1 IP address (1 host up) scanned in 5.31 seconds root@kali:~# Enumerating port 80 Run dirb root@kali:~# dirb http://10.0.0.12/ ----------------- DIRB v2.22 By The Dark Raver...

VM 15: Kioptix 2014

Walkthru Notes 2nd approach  using nc via web using php reverse shell 3rd approach   w/o metasploit =================== walkthru: 1.  Updating OpenFuck Exploit(764) but it didnt work here @ https://paulsec.github.io/blog/2014/04/14/updating-openfuck-exploit/ 2. ============== Notes: 80/tcp open   http    Apache httpd 2.2.21 ((FreeBSD) mod_ssl/2.2.21 OpenSSL/0.9.8q DAV/2 PHP/5.3.8) MAC Address: 08:00:27:82:89:F9 (Oracle VirtualBox virtual NIC) Running: FreeBSD 9.X|10.X OS CPE: cpe:/o:freebsd:freebsd:9 cpe:/o:freebsd:freebsd:10 OS details: FreeBSD 9.0-RELEASE - 10.3-RELEASE PORT     STATE SERVICE VERSION 8080/tcp open  http    Apache httpd 2.2.21 ((FreeBSD) mod_ssl/2.2.21 OpenSSL/0.9.8q DAV/2 PHP/5.3.8) |_http-server-header: Apache/2.2.21 (FreeBSD) mod_ssl/2.2.21 OpenSSL/0.9.8q DAV/2 PHP/5.3.8 |_http-title: 403 Forbidden MAC Address: 08:00:27:82:89:F9 (Oracle VirtualBox...