Use Beginner Python to Build an SHA1 Hash Brute-Forcer [Tutorial]

preview_player
Показать описание
How to Learn Beginner Python3 to Create Hacking Tools

Cyber Weapons Lab, Episode 021

In this episode, we'll take a beginner's perspective of creating our own Python program to take advantage of a vulnerability. We'll apply this by taking a look at how hashes work, and why some aren't as good as others for storing passwords.

Follow Null Byte on:
Рекомендации по теме
Комментарии
Автор

nice work .... finally found a channel where I can chill

tensor-records
Автор

Great video again. It would be really nice if you make more of videos of handwritten python codes for making such tools.

WordlyAnkit
Автор

Thank you so much. The detail you put into explaining every minor detail is awesome. 😇😇😇

-someone-.
Автор

This is disurbingly simle yet secure. Salting is OP.

JorvikBerserkir
Автор

The topics of your videos are always excellent. Consider a QoL improvement to increase the size of the print to be more legible.

raass
Автор

You should say Hello to your people supporting your channel first !

enxhikoraqe
Автор

Im trying to run this in python but with a local file (that iv modyfied from another online text file plus sorted it by lengh and then cammal cased it as its to act like a fall back if the normal online version fails, so i got it downloaded and sorted but running the loop without the web stuff has confused me can you help?

JNET_Reloaded
Автор

Dude, I recently got pycharm community edition... Will this work for, community edition?

threepoint
Автор

I lost my steam account and i had 30+ games and i didn't have steam guard is there any way to get it back using this?

CodaFit
Автор

I had to do this in bash for linux 2 class. I thought it was fairly simple and really taught me alot. havent tries it in python yet, but I havent learned enough python yet to do it. For the mid term I was supposed to write a log on script like previously done on class, but add another piece and monitor for the correct login credentials. if the wrong credentials were used it was supposed to go back to the logon and ask for the user password again. I know you use a while loop for that, but I couldnt get it to work the way it was supposed to. Do you have any useful ways of demonstrating a while loop? I found examples online but they werent very helpful.

brandondh
Автор

Hello I wanted to ask you if you could do a tutorial about how to set up the panda wireless with Linux systems Specifically with parrot Os please

AB_lo
Автор

Amazing content! Thanks for the share Kody, but if we're using a list of passwords, wouldn't that be a dictionary attack rather than brute forcing?

MisterBillieK
Автор

Hi Null Byte. Can you do a video tutorial on the Wifi Pineapple device? It would be cool to see some uses for it as there are not many videos on YouTube

encryptdbrkr
Автор

sir how to convert password "matrix" in md5 and video on that???

arshad.mp
Автор

Hi great video. Can I ask you why you use a macbook pro, for programming and other ITsec stuff, instead of a normal pc with a linux distro on it?

danielsc
Автор

Very interesting. Keep up the good work!

BrosPlayer
Автор

Null Byte, I can't find the code you used in this video.

threepoint
Автор

hello, Mr, i am from refugee camp. i am really intresting hacking.But i didn't have any hacking knowledge.So, how can i begin for hacking lesson.

wow..wow..wow..channel
Автор

More videos like this please i love it !!

cosky
Автор

Try making a sha256 rainbowtable that is mixed alpha numeric and has 32symbols and try that on a router.

anonymousmesage
welcome to shbcf.ru