If you read us regularly you probably already know that one of the techniques of hacking is brute force. But in order to successfully carry out such an attack, we need a very good wordlist (ie the choice of words in the MDM may contain the password of the victim). I would like to add that the district and a brute force attack can not be started without Wordlist. How to create a simple Wordlist with Crunch, we’ve already written, but how to create a good straight ekzemplyar question many hackers who are looking for ready-made or even buy them! But why when you can sohdat your sobstennyh.

Create your Wordlist

To start, set the crunch if you do not have.

apt-get install crunch

To get acquainted with the crunch a manual which describes how and what we write.

man crunch

The basic syntax for the  crunch  as follows:

crunch <min> <max> <characterset> -t <pattern> -o <output filename>
@ - lower case
- Capital letters
% - Figures
^ - Special characters


But how do we create wordlist with a combination of words that we need? Let me give a couple of examples.

crunch 8 8 -t name%%%% -o Desktop/file.txt



August 8 the length of our thong, syntax file creation -t, -o where it will remain   our file.
In this case, we will generate the file:
String of 8 characters, the first 4 letters will name the remaining 4 are the numbers from 0000 to 9999
crunch July 7 -t,% abc% ^ -o Desktop / fil.txt


crunch 8 8 -t %%, @@@@ ^ -d 2% -b 99mb -o START

crunch will generate  an 8-  character string   starting with the 000A into individual files 99mb.

Cant help but remind you that this method is not outdated and is very effective against unprotected sites and is useful for creating Wordlista for Wifi hacking .

The article is provided for informational purposes only and is not a call to action.




About The Author

I am Ethical Hacker, Penetration tester, and Security Professional. I am an OWASP International Member. I have previously experience to work with Big corporate, Government and well-funded startups. My Company SECUPENT () is multiple award winning Cyber Security and Outsourcing Company. I am not only can save you from known vulnerabilities, also can protect you from 0day exploits and attacks from 3rd party threats.

Related Posts

Leave a Reply

Your email address will not be published.