Apr 10, 2012

CIntruder - pentesting tool to bypass captchas.

CIntruder is an automatic pentesting tool to bypass captchas.

Usage

cintruder [OPTIONS]

Options:

--version show program's version number and exit
-h, --help show this help message and exit
-v, --verbose active verbose mode output results
--proxy=PROXY use proxy server (tor: http://localhost:8118)
--track=TRACK download captchas from url (to: 'inputs/')
--track-n=TRACKN number of captchas to track (default: 5)
--train=TRAIN apply OCR techniques to file
--train-u=TRAINU apply OCR techniques to url
--crack=CRACK brute force captchas from file
--crack-u=CRACKU brute force captchas from url
--xml export result to xml format

Advanced OCR (training):

--set-id=SETIDS set colour's id manually (use -v for details)
--editor launch an editor to apply image filters

Examples

If you have interesting examples of usage about CIntruder, please send an email to the mailing list.
-------------------
* Simple crack from file:


$ python cintruder --crack "captcha.gif"

-------------------
* Simple crack from URL:

$ python cintruder --crack-u "http://host.com/path/captcha.gif"

-------------------
* Simple crack, exporting results to xml file

$ python cintruder --crack "captcha.gif" --xml "test.xml"

-------------------
* Simple crack from URL, with proxy TOR and verbose output

$ python cintruder --crack-u ""http://host.com/path/captcha.gif" --proxy "http://127.0.0.1:8118" -v

-------------------
* Train captcha(s) from url with proxy TOR and verbose output

$ python cintruder --train-u "http://host.com/path/captcha.gif" --proxy="http://127.0.0.1:8118" -v

-------------------
* Track 50 captcha(s) from url with proxy TOR

$ python cintruder --track "http://host.com/path/captcha.gif" --track-n "50" --proxy "http://127.0.0.1:8118"


Source: http://cintruder.sourceforge.net/

f you like my blog, Please Donate Me

 

Sponsors

lusovps.com

Blogroll

About

 Please subscribe my blog.

 Old Subscribe

Share |