authoscope icon indicating copy to clipboard operation
authoscope copied to clipboard

Scriptable network authentication cracker (formerly `badtouch`)

Results 22 authoscope issues
Sort by recently updated
recently updated
newest added

Typically README's of such tools contain disclaimer like "you it at your own risk" or "usage of this tool outside your own network may incur legal penalties" or something like...

It turned out the scheduler is surprisingly inefficient at loading very large lists. After some math it turns out it needs to be redesigned to allow lists of that size...

scheduler

Blocked by https://github.com/a8m/pb/pull/62 There are some files and macros vendored that can be removed after this bug is fixed: - ~`src/tty.rs` can be deleted~ - `printfl!` can be deleted -...

We should consider moving from hlua to rlua: https://github.com/chucklefish/rlua

runtime

The python example in the readme currently doesn't do any error handling, so a network failure would not result in a retry but marks the attempt as failed. The python...

runtime

A different threadpool might be more efficient on ram. This might be interesting: https://github.com/kinghajj/kirk Related to #31

scheduler

The essential feature of the badtouch runtime is the http library that's currently missing. It should be very similar to python-requests. Specifically, the following things need to be supported: ##...

runtime

It should be possible to stop the audit at a position and then resume at that position. I'm not yet sure how that should be implemented: - Credentials can get...

scheduler

There might be a need to have hash functions in the runtime to implement authentication. The following things should be supported: - [x] md5 - [x] sha1 - [x] sha2-256...

runtime

You can easily bump into the limit of open files (`uname -n`), this needs to be increased manually or by badtouch. If this limit is reached, it's hard to recover.