- Mastering Kali Linux for Advanced Penetration Testing(Second Edition)
- Vijay Kumar Velu
- 238字
- 2021-07-02 21:04:17
Profiling users for password lists
So far, you have learned how to use passive reconnaissance to collect names and biographical information about the users of the target being tested; this is the same process used by hackers. The next step is to use this information to create password lists specific to the users and the target.
Lists of commonly used passwords are available for download, and are stored locally on Kali in the /usr/share/wordlists directory. These lists reflect the choices of a large population of users, and it can be time-consuming for an application to attempt to use each possible password before moving on to the next password in the queue.
Fortunately, Common User Password Profiler (CUPP) allows the tester to generate a word list that is specific to a particular user. CUPP was present on Backtrack 5r3; however, it will have to be downloaded for use on Kali. To obtain CUPP, enter the following command:
git clone https://github.com/Mebus/cupp.git
This will download CUPP to the local directory.
CUPP is a Python script and can be simply invoked from the CUPP directory by entering the following command:
root@kali:~# python cupp.py -i
This will launch CUPP in interactive mode, which prompts the user for specific elements of information to use in creating a word list. An example is shown in the following screenshot:

When the interactive mode has completed creating a word list, it is placed in the CUPP directory.
- Learn ECMAScript(Second Edition)
- C語言程序設計案例教程(第2版)
- Learning C++ Functional Programming
- Dependency Injection in .NET Core 2.0
- Linux網絡程序設計:基于龍芯平臺
- Python Network Programming Cookbook(Second Edition)
- PLC編程及應用實戰
- 零基礎學Python網絡爬蟲案例實戰全流程詳解(高級進階篇)
- INSTANT Adobe Edge Inspect Starter
- Access 2010中文版項目教程
- FPGA嵌入式項目開發實戰
- Java Web從入門到精通(第2版)
- 分布式數據庫原理、架構與實踐
- Python函數式編程(第2版)
- Java7程序設計入門經典