官术网_书友最值得收藏!

Profiling users for password lists

So far, you have learned how to use passive reconnaissance to collect names and biographical information about the users of the target being tested; this is the same process used by hackers. The next step is to use this information to create password lists specific to the users and the target.

Lists of commonly used passwords are available for download, and are stored locally on Kali in the /usr/share/wordlists directory. These lists reflect the choices of a large population of users, and it can be time-consuming for an application to attempt to use each possible password before moving on to the next password in the queue.

Fortunately, Common User Password Profiler (CUPP) allows the tester to generate a word list that is specific to a particular user. CUPP was present on Backtrack 5r3; however, it will have to be downloaded for use on Kali. To obtain CUPP, enter the following command:

git clone https://github.com/Mebus/cupp.git

This will download CUPP to the local directory.

CUPP is a Python script and can be simply invoked from the CUPP directory by entering the following command:

root@kali:~# python cupp.py -i

This will launch CUPP in interactive mode, which prompts the user for specific elements of information to use in creating a word list. An example is shown in the following screenshot:

When the interactive mode has completed creating a word list, it is placed in the CUPP directory.

主站蜘蛛池模板: 石台县| 江陵县| 平阳县| 日照市| 苍山县| 孝义市| 张掖市| 西贡区| 闽清县| 武山县| 湟中县| 循化| 买车| 延吉市| 阜城县| 辽宁省| 同仁县| 普安县| 博爱县| 玉山县| 新田县| 信丰县| 油尖旺区| 兴山县| 玉树县| 新泰市| 荣成市| 仁化县| 明水县| 汾西县| 卢龙县| 定陶县| 肥城市| 潢川县| 长岛县| 新巴尔虎左旗| 正蓝旗| 五大连池市| 恭城| 阜宁县| 夏津县|