Page 1 of 3 123 LastLast
Results 1 to 10 of 22

Thread: {-=Xploitz=-} REQUEST "Calling all Programmers"

  1. #1
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Exclamation {-=Xploitz=-} REQUEST "Calling all Programmers"

    Hello to all who read this thread.

    I am in need of someone to code or create a program for my WPA/WP2 dictionary .txt and .lst

    I don't care if its Coded for Windows or for Linux...but I prefer Linux.

    No I don't need a dictionary or a wordlist maker....

    I NEED AN EDITOR.

    But not just any old editor. I need a "Special" editor. I need an editor that can handle -=Xploitz=- SIZED wordlist. 3GIG MINIMUM!! I need this editor to "clean up" my Special wordlist. I need it to take ALL of my dictionaries & wordlist, and process them and ELIMINATE any words, numbers, or the combination of words, numbers, and special characters that are LOWER than 8 characters in length ....without it fu(k1ng up my dictionaries and wordlist.

    If anyone can make or code this "Special Wordlist Manipulator"...in return, I WILL GIVE YOU A COPY OF MY OWN PERSONAL "ULTIMATE WHITEHAT DICTIONARY / WORDLIST COLLECTION VIA FTP CONNECTION ONLY!!!"


    Minus my 1 Uber l33t Special H4X0r Dictionary of course.

    SERIOUS INQUIRIES ONLY!!

    MAKE ALL INQUIRES VIA PM!!

    May the source be with you.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  2. #2
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    This really shouldn't be that hard. What format are the files currently in, plain Text?
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  3. #3
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    yes.

    I have 2 file types

    .txt and .lst

    I know it doesn't "sound" hard....but to me its rocket science!! ..lol
    I know nothing of programming except some programming with Visual Basic 6..lol
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  4. #4
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by -=Xploitz=- View Post
    yes.

    I have 2 file types

    .txt and .lst

    I know it doesn't "sound" hard....but to me its rocket science!! ..lol
    I know nothing of programming except some programming with Visual Basic 6..lol
    The quickest and easiest way I can think to do it since they're as large as they are would be to import them into an SQL Database, and then do a select for all records that LEN => 8 and have it output that to a .txt file.

    It's really quite easy.
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  5. #5
    Junior Member
    Join Date
    May 2007
    Posts
    34

    Default c++

    maybe it would be easy to program it with c++ and go line by line through the txt and create a new txt just with the words lager than 7 characters

  6. #6
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by r0v0s View Post
    maybe it would be easy to program it with c++ and go line by line through the txt and create a new txt just with the words lager than 7 characters
    It all depends upon what your skills are as to what is easier. Since I don't know C++ but do know SQL, in my viewpoint, doing the database is easy.
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  7. #7
    Junior Member
    Join Date
    Jul 2007
    Posts
    66

    Default

    why don't you do just a grep in linux and pipe the output to a file

    simple

  8. #8
    Junior Member
    Join Date
    Jan 2010
    Posts
    53

    Default

    well i've been very busy past days. But sharing a nice tip to xploitz will be just in time

    This is what i'm doing when polishing wordlist
    First sort and eliminate double entries
    #cat all.txt | sort | uniq > sortedUniqueList.txt

    To kick all non wpa acceptable do this
    #cat sortedUniqueList.txt | pw-inspector -m 8 -M 63 > wpaList.txt

    pw-inspector is part of bt and coded by thc-group ( don't blame me if i'm wrong)

    Hope this will help, at least 2 GB are done really quick (depends only on harddisk speed)
    So mail me for ftp account information

  9. #9
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default Nice suggestions! Thanks to EVERYONE!! :)

    Very intriguing ideas gentlemen!!!

    I'm leaning towards thetom because I also forgot to mention that I wanted to delete all duplicates that MAY be in my dictionaries. To tell ya the truth, I wasn't even aware of the pw-inspector in BT2. I don't even think its mentioned at all on the WiKi!

    I will try to make time to try this out today thetom.

    But I wanted to take time to thank you all...

    Streaker69 for his very fast and informative reply.
    rOvOs for his C++ suggestion.
    durana for his grep command suggestion
    thetom for his very BIG tip that may just be what I'm looking for.

    However, until I get a chance to play with the suggested methods...if anybody has any other alternatives....please post them and I will see if they fit my needs. Theres still time.

    BTW..just to point it out one more time...

    IT MUST REMOVE DUPLICATES AS WELL


    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  10. #10
    Developer
    Join Date
    Mar 2007
    Posts
    6,124

    Default

    raptor 3 wont do it?

Page 1 of 3 123 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •