![]() Server.py v1.0: A simple Python script designed to listen for incoming connections on the host machine. This script is designed to be placed on the target machine and establish a connection with the command system, waiting to receive commands to execute and send back. ReverseShell.py: Works in conjunction with server.py. Keylogger.py: A simple keylogger that can be run on the target machine to record all the keystrokes the target types while using the target machine. #Http sniffer script password#If the hashes match, the script will print the un-hashed password to the console. It will calculate the SHA1 hashes of the 10,000 more common passwords and compare them to the user inputted hash. Sha1Hash.py: The script will ask the user to input a pre-computed SHA1 hash. If the password is a match, the script will print the un-hashed password to the console. It will compare the input to the MD5 hashes from the user specified file. Md5Brute.py: This script will ask the user to input a pre-computed MD5 hash. SHA256, and SHA512 hashes of the user specified phrase. Hasher.py: Simple script that prints out the MD5, SHA1, SHA224. If the computer encrypted password matches the user's password, it prints the result to the console. By using a dictionary text file containing the most commonly used password, the script encrypts the dictionary passwords with the salt and compares them to passwords file which contain the user's pre-computed salted password. The script starts with grabbing the salt used by the passwords. The script will differentiate the packet's protocol as either TCP or UDP and print their respective headers to the console.ĬryptForce.py: This script attempts to mimic a dictionary attack against salted password. packetAnalyzer.py: This Python program will analyze each packet received by the host machine and print out the contents of its Ethernet, IP, and TCP/UDP headers to the console.For example, this script can be used to block port 80 on the target, resulting in the target being unable to/slowly able to access the internet. The script will consistently send packets to the destination IP address and port specified by the user, masquerading as an IP address different than the machine that is running the program. SynFlooder.py: This Python script will attempt a SYN Flood attack. #Http sniffer script mac#This script will sniff all packets sent and received by the host machine and will print to the console the packet's destination and source MAC address and protocol being used. MacSniffer.py: This Python script is designed to mimic the sniffing capabilities of Wireshark. The script will bring down the interface, change the MAC address, then bring the interface back up. MacChanger.py: This Python script is designed to allow a user to change their MAC address of an interface of their choosing. The below images show what the script will print to console when I attempt to log on to with the username and password of admin / admin. The script will print out the captured packet's URL for the site logged into and payload that contains the username and password. HttpSniffer.py: This Python script is designed to sniff the host machine for any HTTP packet in an attempt to grab a packet that contains a user's username and password they used to log into a website. When a user attempts to FTP onto a server, the script will print to the console the username, password, and IP used for the FTP connection. If the user interrupts the program while it is executing, the script will restore the ARP tables back to their original state.įtpSniffer.py: This Python script is designed to sniff the host machine for any FTP attempts. The script will get the MAC address of the target IP address and attempt to send a packet from the local machine spoofed as the spoofed IP address. Ethical Hacking Python Scripts Flooder, Sniffer, and Spoofer ScriptsĪrpSpoofer.py: This Python script attempts to spoof ARP packets. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |