- Mastering Kali Linux for Advanced Penetration Testing
- Robert W. Beggs
- 233字
- 2021-07-16 11:33:21
Profiling users for password lists
So far, you have learned to use passive reconnaissance to collect names and biographical information for users of the target being tested; this is the same process used by hackers. The next step is to use this information to create password lists specific to the users and the target.
Lists of commonly used passwords are available for download, and are stored locally on Kali in the /usr/share/wordlists
directory. These lists reflect the choices of a large population of users, and it can be time consuming for an application to attempt to use each possible password before moving on to the next password in the queue.
Fortunately, Common User Password Profiler (CUPP) allows the tester to generate a wordlist
that is specific to a particular user. CUPP was present on Backtrack 5r3; however, it will have to be downloaded for use on Kali. To obtain CUPP, enter the following command:
git clone https://github.com/Mebus/cupp.git
This will download CUPP to the local directory.
CUPP is a Python script, and can be simply invoked from the CUPP directory by entering the following command:
root@kali:~# python cupp.py -i
This will launch CUPP in the interactive mode, which prompts the user for specific elements of information to use in creating wordlist
. An example is shown in the following screenshot:

When the interactive mode has completed creating wordlist
, it is placed in the CUPP directory.
- Web漏洞分析與防范實戰:卷1
- 腦洞大開:滲透測試另類實戰攻略
- 工業互聯網安全
- 零信任網絡:在不可信網絡中構建安全系統
- Practical Network Scanning
- 黑客攻防與無線安全從新手到高手(超值版)
- 移動APT:威脅情報分析與數據防護
- 計算機網絡安全技術研究
- 網絡安全能力成熟度模型:原理與實踐
- 信息安全案例教程:技術與應用(第2版)
- 物聯網安全滲透測試技術
- 網絡安全設計、配置與管理大全
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- Bug Bounty Hunting Essentials
- 網絡空間安全:拒絕服務攻擊檢測與防御