Skip to main content

OMSTD CH-001 study case: cracking MD5 password using online resolver services.

Project description

What's this project?
====================

This project is a basic MD5 searcher, using http://md5cracker.org webservice. It belongs to OMSTD Project (https://github.com/cr0hn/OMSTD).

Licence
=======

This project is **BSD**... Copy it! And, if you remember, please mention me in credits :)

How to install
==============

.. code-block:: bash

sudo python3.4 -m pip install OMSTD-ch-001

How use it?
===========

You can use this project as a command line tool or as a library, as part of your Python projects.

As a tool
---------

You can display all options to run as command line running command :samp:`omstd-ch-001 -h`:

.. code-block:: bash

usage: omstd-ch-001 [-h] -m PASSWORD [-v VERBOSITY] [-p PROVIDER]
[--proxy PROXY] [--list-providers]

OMSTD Example

optional arguments:
-h, --help show this help message and exit
-m PASSWORD, --md5 PASSWORD
MD5 hashed value to test
-v VERBOSITY verbosity level
-p PROVIDER select provider used to get cracked MD5 hash. Defaul:
all.
--proxy PROXY proxy in format: http://USER:PASS@IP:PORT
--list-providers list password providers

Providers are the repositories that contains the MD5 <-> plain text information. By default it has the value 'all', but you can list available list running :samp:`omstd-ch-001 --list-providers`:

.. code-block:: bash

Cracking providers:
- all (special case. Select all providers)
- md5cracker.org
- tmto
- md5.net
- md5online.net
- md5.my-addr.com
- md5decryption.com
- md5crack
- authsecu
- netmd5crack
- md5pass
- i337.net

A complete run: :samp:`omstd-ch-001 -m 5eb63bbbe01eeed093cb22bb8f5acdc3`:

.. code-block:: bash

[**] Plain text FOUND!!!. Decoded password is ----> hello world <----.

As a library
------------

.. code-block:: python

from omstd_ch_001.api import Parameters, run_check_md5_hash

if __name__ == "__main__":

# Set config
try:
input_parameters = Parameters(md5_hash=params.password,
verbosity=params.verbosity,
provider=params.provider,
proxy=params.proxy)
except ValueError as e:
print(e)
exit()

run_check_md5_hash(input_parameters)

# Display scan time
try:
result = run_check_md5_hash(input_parameters)

print("[**] Plain text FOUND!!!. Decoded password is ----> %s <----." % result.plain_password)
except:
print("[**] Password not found")

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

OMSTD-ch-001-0.1.1.tar.gz (5.2 kB view details)

Uploaded Source

File details

Details for the file OMSTD-ch-001-0.1.1.tar.gz.

File metadata

File hashes

Hashes for OMSTD-ch-001-0.1.1.tar.gz
Algorithm Hash digest
SHA256 a60e29e0af8dd6b6277009f22c6fb1d0690337f33152dc62bdecbbc553eb1408
MD5 77bc139bcb636250610d10ac82587f02
BLAKE2b-256 95107cb82ca89b73d726fc5199b25a2c942c242979860fa1fef763988aca6424

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page