基于区块链的毕业设计Ethical-Hacking – 道德黑客攻击

本文提供基于区块链的毕业设计国外最新区块链项目源码下载,包括solidity,eth,fabric等blockchain区块链,基于区块链的毕业设计Ethical-Hacking – 道德黑客攻击 是一篇很好的国外资料

Ethical-Hacking

My Journey into Ethical Hacking with Python.

  1. portscanner – This allows a user to specify the host and ports they would like to scan. Uses threading for scanning multiple ports at once and optparse to provide the options to the code.

  2. SSH – The sshbruteforce.py code allows you to login with bruteforce using a dictionary attack. This attack was carried out successfully on metasploitable. The sshlogin.py using pexpect to automate the ssh login(useful for sysadmins.)

  3. PasswordCracking – The hash.py file helps convert any arbitrary string value to a hash value of md5, sha1, sha256 and sha512. The crackSHA1.py takes a sha1 hash and compares it to a 10000 common password file from github and provides a success message if the hash matches to any of the password in the list. The crackMD5.py takes a md5 hash value and compares it to a password file (of your choice) and provides a success or failure message accordingly. The crypt.py uses the password.txt file which is a mock of a database containing username and password with a salt and dictionary.txt which is a password list and then use this information to find the correct password.


道德黑客攻击

我与Python的道德黑客之旅。

  1. portscanner-这允许用户指定他们想要扫描的主机和端口。使用线程一次扫描多个端口,并使用optparse为代码提供选项。
  2. SSH-sshbruteforce.py代码允许您使用字典攻击使用bruteforce登录。这次攻击在metasploitable上成功执行。这个sshlogin.py使用pexpect自动化ssh登录(对系统管理员很有用)哈希.py文件帮助将任意字符串值转换为md5、sha1、sha256和sha512的哈希值。crackSHA1.py获取一个sha1散列,并将其与github中的10000个公共密码文件进行比较,如果哈希与列表中的任何密码匹配,则会提供成功消息。crackMD5.py接受md5散列值,并将其与密码文件(您选择的)进行比较,并相应地提供成功或失败消息。这个地下室.py使用密码.txt一个模拟数据库的文件,其中包含用户名和密码以及salt和字典.txt这是一个密码列表,然后使用此信息查找正确的密码。在
  3. PasswordCracking – The hash.py file helps convert any arbitrary string value to a hash value of md5, sha1, sha256 and sha512. The crackSHA1.py takes a sha1 hash and compares it to a 10000 common password file from github and provides a success message if the hash matches to any of the password in the list. The crackMD5.py takes a md5 hash value and compares it to a password file (of your choice) and provides a success or failure message accordingly. The crypt.py uses the password.txt file which is a mock of a database containing username and password with a salt and dictionary.txt which is a password list and then use this information to find the correct password.

部分转自网络,侵权联系删除区块链源码网

www.interchains.cc

https://www.interchains.cc/17645.html

区块链毕设网(www.interchains.cc)全网最靠谱的原创区块链毕设代做网站 部分资料来自网络,侵权联系删除! 最全最大的区块链源码站 !
区块链知识分享网, 以太坊dapp资源网, 区块链教程, fabric教程下载, 区块链书籍下载, 区块链资料下载, 区块链视频教程下载, 区块链基础教程, 区块链入门教程, 区块链资源 » 基于区块链的毕业设计Ethical-Hacking – 道德黑客攻击

提供最优质的资源集合

立即查看 了解详情