官术网_书友最值得收藏!

Profiling users for password lists

So far, you have learned how to use passive reconnaissance to collect names and biographical information about the users of the target being tested; this is the same process used by hackers. The next step is to use this information to create password lists specific to the users and the target.

Lists of commonly used passwords are available for download, and are stored locally on Kali in the /usr/share/wordlists directory. These lists reflect the choices of a large population of users, and it can be time-consuming for an application to attempt to use each possible password before moving on to the next password in the queue.

Fortunately, Common User Password Profiler (CUPP) allows the tester to generate a word list that is specific to a particular user. CUPP was present on Backtrack 5r3; however, it will have to be downloaded for use on Kali. To obtain CUPP, enter the following command:

git clone https://github.com/Mebus/cupp.git

This will download CUPP to the local directory.

CUPP is a Python script and can be simply invoked from the CUPP directory by entering the following command:

root@kali:~# python cupp.py -i

This will launch CUPP in interactive mode, which prompts the user for specific elements of information to use in creating a word list. An example is shown in the following screenshot:

When the interactive mode has completed creating a word list, it is placed in the CUPP directory.

主站蜘蛛池模板: 广安市| 东安县| 贞丰县| 平乡县| 深水埗区| 策勒县| 博湖县| 山阳县| 苍梧县| 铜梁县| 仙居县| 弥渡县| 清徐县| 都江堰市| 海门市| 砚山县| 农安县| 大渡口区| 南丹县| 乐都县| 无棣县| 和田县| 武安市| 南丰县| 开阳县| 合山市| 筠连县| 鞍山市| 仪征市| 沂源县| 天等县| 烟台市| 新巴尔虎左旗| 合江县| 化州市| 仁布县| 新田县| 炎陵县| 栾川县| 抚宁县| 九龙城区|