Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use password attempts from files (e.g. rockyou or top 1000) #4

Open
global4g opened this issue Nov 25, 2017 · 3 comments
Open

Use password attempts from files (e.g. rockyou or top 1000) #4

global4g opened this issue Nov 25, 2017 · 3 comments

Comments

@global4g
Copy link

Is it possible to brute-force based on a predefined password file ?

@lmammino
Copy link
Owner

lmammino commented Nov 25, 2017 via email

@global4g
Copy link
Author

Thanks for your quick response. yes I might be interested to give this a shot. Not much experience in node as such but familiar with crypto, hmac stuff. Will check the source code. if you have any words of advice, i would appreciate that.
Thanks again!

@lmammino
Copy link
Owner

lmammino commented Nov 25, 2017

Sure, super happy to help on this.

So this is the current main logic: https://github.com/lmammino/jwt-cracker/blob/master/index.js#L54-L69

Here we basically use the variations-stream library to generate all the possible variations of strings over an alphabet.

Every variation string is pushed to the stream, so we use the on('data') event to get the current string.

If you change the source string to push the data from a file line by line, the rest of the code should remain pretty much the same. Check byline, if you need a quick win on reading a file line by line using a streamable interface.

I hope that's useful!

@lmammino lmammino changed the title rockyou or top 1000 Use password attempts from files (e.g. rockyou or top 1000) Nov 25, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants