Darknet
Published © Apache-2.0

πŸ”₯ ETHICAL HACKING MASTER PACK πŸ”₯ πŸ’š All Courses + Premium T

Ethical Hacking, Cyber Security, Kali Linux, Bug Bounty, tools, scripts, and real labs all in one place.

AdvancedFull instructions providedOver 1 day55
πŸ”₯ ETHICAL HACKING MASTER PACK πŸ”₯ πŸ’š All Courses + Premium T

Things used in this project

Software apps and online services

Aut2Exe
Advance IP Scanner

Hand tools and fabrication machines

Fake BTC sender Tool 2021

Story

Read more

Custom parts and enclosures

Python Tutorial

Python is one of the most popular programming languages. It’s simple to use, packed with features and supported by a wide range of libraries and frameworks. Its clean syntax makes it beginner-friendly.

A high-level language, used in web development, data science, automation, AI and more.
Known for its readability, which means code is easier to write, understand and maintain.
Backed by library support, so we don’t have to build everything from scratch.

Schematics

How Password Are Hacked

Everyone knows that passwords are not stored a plain text in the website's database. Now we are going to see how to hack a plain text password when you find a password that is in hashed(md5) format. So we take the input_hash(hashed password in the database) and try to compare it with md5 hash of every plain text password which is in a password file(pass_doc) and when the hashes are matched we simply display the plain text password which is in the password file(pass_doc). If the password is not present in the input password file it will say password is not found, this happens only if buffer overflow doesn't occur. This type of attack can be considered as a dictionary attack.

Below is the implementation. Let's suppose the text file containing list of password is password.txt.

Code

How Password Are Hacked

Python
Everyone knows that passwords are not stored a plain text in the website's database. Now we are going to see how to hack a plain text password when you find a password that is in hashed(md5) format. So we take the input_hash(hashed password in the database) and try to compare it with md5 hash of every plain text password which is in a password file(pass_doc) and when the hashes are matched we simply display the plain text password which is in the password file(pass_doc). If the password is not present in the input password file it will say password is not found, this happens only if buffer overflow doesn't occur. This type of attack can be considered as a dictionary attack.

Below is the implementation. Let's suppose the text file containing list of password is password.txt.
import hashlib
print("**************PASSWORD CRACKER ******************")
       
# To check if the password
# found or not.
pass_found = 0                                      

input_hash = input("Enter the hashed password:")

pass_doc = input("\nEnter passwords filename including path(root / home/):")
 
try:
    # trying to open the password file.
    pass_file = open(pass_doc, 'r')              
except:
    print("Error:")
    print(pass_doc, "is not found.\nPlease give the path of file correctly.") 
    quit()


# comparing the input_hash with the hashes
# of the words in password file,
# and finding password.

for word in pass_file:
    # encoding the word into utf-8 format
    enc_word = word.encode('utf-8')  
            
    # Hashing a word into md5 hash
    hash_word = hashlib.md5(enc_word.strip())   
 
    # digesting that hash into a hexa decimal value     
    digest = hash_word.hexdigest()         
     
    if digest == input_hash:
        # comparing hashes
        print("Password found.\nThe password is:", word)   
        pass_found = 1
        break

# if password is not found.
if not pass_found:
    print("Password is not found in the", pass_doc, "file")   
    print('\n')
print("*****************  Thank you  **********************")

Credits

DarkNet Ghost πŸ’€

Posted by Darknet

Comments