OMSTD CH-001 study case: cracking MD5 password using online resolver services.
Project description
What's this project?
====================
This project is a basic MD5 searcher, using http://md5cracker.org webservice. It belongs to OMSTD Project (https://github.com/cr0hn/OMSTD).
Licence
=======
This project is **BSD**... Copy it! And, if you remember, please mention me in credits :)
How to install
==============
.. code-block:: bash
sudo python3.4 -m pip install OMSTD-ch-001
How use it?
===========
You can use this project as a command line tool or as a library, as part of your Python projects.
As a tool
---------
You can display all options to run as command line running command :samp:`omstd-ch-001 -h`:
.. code-block:: bash
usage: omstd-ch-001 [-h] -m PASSWORD [-v VERBOSITY] [-p PROVIDER]
[--proxy PROXY] [--list-providers]
OMSTD Example
optional arguments:
-h, --help show this help message and exit
-m PASSWORD, --md5 PASSWORD
MD5 hashed value to test
-v VERBOSITY verbosity level
-p PROVIDER select provider used to get cracked MD5 hash. Defaul:
all.
--proxy PROXY proxy in format: http://USER:PASS@IP:PORT
--list-providers list password providers
Providers are the repositories that contains the MD5 <-> plain text information. By default it has the value 'all', but you can list available list running :samp:`omstd-ch-001 --list-providers`:
.. code-block:: bash
Cracking providers:
- all (special case. Select all providers)
- md5cracker.org
- tmto
- md5.net
- md5online.net
- md5.my-addr.com
- md5decryption.com
- md5crack
- authsecu
- netmd5crack
- md5pass
- i337.net
A complete run: :samp:`omstd-ch-001 -m 5eb63bbbe01eeed093cb22bb8f5acdc3`:
.. code-block:: bash
[**] Plain text FOUND!!!. Decoded password is ----> hello world <----.
As a library
------------
.. code-block:: python
from omstd_ch_001.api import Parameters, run_check_md5_hash
if __name__ == "__main__":
# Set config
try:
input_parameters = Parameters(md5_hash=params.password,
verbosity=params.verbosity,
provider=params.provider,
proxy=params.proxy)
except ValueError as e:
print(e)
exit()
run_check_md5_hash(input_parameters)
# Display scan time
try:
result = run_check_md5_hash(input_parameters)
print("[**] Plain text FOUND!!!. Decoded password is ----> %s <----." % result.plain_password)
except:
print("[**] Password not found")
====================
This project is a basic MD5 searcher, using http://md5cracker.org webservice. It belongs to OMSTD Project (https://github.com/cr0hn/OMSTD).
Licence
=======
This project is **BSD**... Copy it! And, if you remember, please mention me in credits :)
How to install
==============
.. code-block:: bash
sudo python3.4 -m pip install OMSTD-ch-001
How use it?
===========
You can use this project as a command line tool or as a library, as part of your Python projects.
As a tool
---------
You can display all options to run as command line running command :samp:`omstd-ch-001 -h`:
.. code-block:: bash
usage: omstd-ch-001 [-h] -m PASSWORD [-v VERBOSITY] [-p PROVIDER]
[--proxy PROXY] [--list-providers]
OMSTD Example
optional arguments:
-h, --help show this help message and exit
-m PASSWORD, --md5 PASSWORD
MD5 hashed value to test
-v VERBOSITY verbosity level
-p PROVIDER select provider used to get cracked MD5 hash. Defaul:
all.
--proxy PROXY proxy in format: http://USER:PASS@IP:PORT
--list-providers list password providers
Providers are the repositories that contains the MD5 <-> plain text information. By default it has the value 'all', but you can list available list running :samp:`omstd-ch-001 --list-providers`:
.. code-block:: bash
Cracking providers:
- all (special case. Select all providers)
- md5cracker.org
- tmto
- md5.net
- md5online.net
- md5.my-addr.com
- md5decryption.com
- md5crack
- authsecu
- netmd5crack
- md5pass
- i337.net
A complete run: :samp:`omstd-ch-001 -m 5eb63bbbe01eeed093cb22bb8f5acdc3`:
.. code-block:: bash
[**] Plain text FOUND!!!. Decoded password is ----> hello world <----.
As a library
------------
.. code-block:: python
from omstd_ch_001.api import Parameters, run_check_md5_hash
if __name__ == "__main__":
# Set config
try:
input_parameters = Parameters(md5_hash=params.password,
verbosity=params.verbosity,
provider=params.provider,
proxy=params.proxy)
except ValueError as e:
print(e)
exit()
run_check_md5_hash(input_parameters)
# Display scan time
try:
result = run_check_md5_hash(input_parameters)
print("[**] Plain text FOUND!!!. Decoded password is ----> %s <----." % result.plain_password)
except:
print("[**] Password not found")
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
OMSTD-ch-001-0.1.1.tar.gz
(5.2 kB
view details)
File details
Details for the file OMSTD-ch-001-0.1.1.tar.gz
.
File metadata
- Download URL: OMSTD-ch-001-0.1.1.tar.gz
- Upload date:
- Size: 5.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | a60e29e0af8dd6b6277009f22c6fb1d0690337f33152dc62bdecbbc553eb1408 |
|
MD5 | 77bc139bcb636250610d10ac82587f02 |
|
BLAKE2b-256 | 95107cb82ca89b73d726fc5199b25a2c942c242979860fa1fef763988aca6424 |