authoscope
authoscope copied to clipboard
Scriptable network authentication cracker (formerly `badtouch`)
Typically README's of such tools contain disclaimer like "you it at your own risk" or "usage of this tool outside your own network may incur legal penalties" or something like...
It turned out the scheduler is surprisingly inefficient at loading very large lists. After some math it turns out it needs to be redesigned to allow lists of that size...
Blocked by https://github.com/a8m/pb/pull/62 There are some files and macros vendored that can be removed after this bug is fixed: - ~`src/tty.rs` can be deleted~ - `printfl!` can be deleted -...
We should consider moving from hlua to rlua: https://github.com/chucklefish/rlua
The python example in the readme currently doesn't do any error handling, so a network failure would not result in a retry but marks the attempt as failed. The python...
A different threadpool might be more efficient on ram. This might be interesting: https://github.com/kinghajj/kirk Related to #31
The essential feature of the badtouch runtime is the http library that's currently missing. It should be very similar to python-requests. Specifically, the following things need to be supported: ##...
It should be possible to stop the audit at a position and then resume at that position. I'm not yet sure how that should be implemented: - Credentials can get...
There might be a need to have hash functions in the runtime to implement authentication. The following things should be supported: - [x] md5 - [x] sha1 - [x] sha2-256...
You can easily bump into the limit of open files (`uname -n`), this needs to be increased manually or by badtouch. If this limit is reached, it's hard to recover.