BruteBot icon indicating copy to clipboard operation
BruteBot copied to clipboard

A Python-based password brute-forcer that leverages the webbot library

BruteBot

  • BruteBot is a Python-based tool that leverages the webbot library to automate the process of brute-forcing login passwords, particularly useful for login pages fortified with CSRF protection or random tokens.

  • The choice of webbot, a library derived from Selenium, was intentional. The goal was to emulate a user navigating the target website’s login page and attempting to brute-force the password in the most unobtrusive manner.

  • This approach ensures that any random tokens that are generated when the login page gets loaded are automatically included in the subsequent login POST requests, thereby making the automation of password brute-forcing possible.

  • Furthermore, it gives you a chance to visualize the browser's operations in real time, which can be useful for troubleshooting.

How BruteBot Operates?

  • It retrieves the login page via a GET request.

  • It utilizes the username / email address and the password list provided by you.

  • It submits these credentials to the server via multiple POST requests (each containing a unique username-password combination), alongside any additional random tokens if present (such as: an anti-CSRF token, an arbitrary browser identifier, timestamp, etc.)

  • It repeats this process until it successfully discovers the correct password.

Requirements

  1. Install webbot using the following command:
pip install webbot
  1. Download or clone the repository.

  2. Place your password list file in the same directory as BruteBot.py.

    That's it! You are good to go!

Usage

Command

python BruteBot.py -t (LOGIN PAGE URL) -u USERNAME -p (PASSWORD LIST) --uid (USERNAME ELEMENT ID) --pid (PASSWORD ELEMENT ID) --bname (LOGIN BUTTON NAME) -m (visible / headless) -s (TIME IN SECONDS)

Program Arguments

Required Arguments

  • -t / --target : URL of the target website's login page

  • -u / --username : A valid username / email address

  • -p / --plist : Path of the password list file

  • --uid : Username Element ID

  • --pid : Password Element ID

  • --bname : Name of the login button element

Optional Arguments

  • -m / --mode : Sets the mode of operation

    • headless : To have all operations run in the background (Default mode: headless)

    • visible : To view the operations happening in your browser

  • -s / --time : Duration, in seconds, for which the browser will wait before commencing the brute-forcing

  • -h / --help : Shows the help message and exits

Quickstart Guide

Demo 1 - To run BruteBot with the default options:

python BruteBot.py -t https://demo.testfire.net/login.jsp -u admin -p passwords.txt --uid uid --pid passw --bname Login



Demo 2 - To see the browser tab(s) in action when BruteBot runs:

python BruteBot.py -t https://demo.testfire.net/login.jsp -u admin -p passwords.txt --uid uid --pid passw --bname Login -m visible



Demo 3 - To route the traffic through a network proxy while running BruteBot:

python BruteBot.py -t https://demo.testfire.net/login.jsp -u admin -p passwords.txt --uid uid --pid passw --bname Login --proxy http://localhost:8080


Disclaimer

  • Please refrain from using this tool on websites without explicit permission, as doing so may be considered illegal or unethical.
  • I bear no responsibility for any misuse of this tool.

Acknowledgments

  • This project utilizes the webbot library, originally developed by the author @nateshmbhat.
  • Special thanks to @m-uma for their invaluable offline contributions that were instrumental in the development of this tool.

License & Contributions

  • This project is licensed under the terms of the MIT license. Feel free to contribute, go ahead and submit a Pull Request.
  • However, if you are considering making significant modifications, I would insist that you discuss with me first by opening an Issue.


Like my work? Buy me a coffee maybe?