OpenWrt 的世界︰樹莓派 3B 【路由器】移星轉斗《四‧三》 劊客 C

據聞今年六月八日,首度俄羅斯有一個命名為『尤金‧古斯特曼』Eugene Goostman 的『人工智慧聊天機器人』通過了圖靈測試。那麼是否一台機器通過了『圖靈測試』就能宣稱它真是具有『智慧』的呢?

Captcha

二零零二年美國卡內基梅隆大學的 Luis von Ahn、Manuel Blum、Nicholas J.Hopper以及 IBM 的 John Langford 聯合提出了『CAPTCHA』── Completely Automated Public Turing test to tell Computers and Humans Apart ──。一般又叫做『驗證碼』,常常用於『□□下載』網頁,想要確認來下載的『真的是人』。它有著多種形式的設計,常見的是要使用者輸入『扭曲變形』的『文字』或是『數字』,這將使得大多數『OCR』這類圖像文字辨識軟體,無法自動判讀,所以很難寫個『軟體自動下載』。雖說都是『圖靈測試』,一者想『不能分辨』,另者要『能夠區別』,不知最終的『AI』是『』還是『不能』的呢??

─── 《人工智慧!!

 

短短一篇文章

How to break a CAPTCHA system in 15 minutes with Machine Learning

 

標誌了一個『新視野』

/CaptchaSolver

based on https://medium.com/@ageitgey/how-to-break-a-captcha-system-in-15-minutes-with-machine-learning-dbebb035a710 by https://github.com/ageitgey https://notebooks.azure.com/run/wegen…

CaptchaSolver Jupyter Notebook

based on https://medium.com/@ageitgey/how-to-break-a-captcha-system-in-15-minutes-with-machine-learning-dbebb035a710 by https://github.com/ageitgey

DEMO

Before you get started

To run these scripts, you need the following installed:

  1. Python 3
  2. OpenCV 3 w/ Python extensions
  1. The python libraries listed in requirements.txt
  • Try running “pip3 install -r requirements.txt”

 

,『劊客』 AI 紀元之來臨?

『指頭戰爭』的時代,所用武器乃『演算法』以及『概念發想』呦!就像

‧ 有人上網查密碼

 findmyhash

Python script to crack hashes using online services

findmyhash.py

findmyhash.py try to crack different types of hashes using free online services.

NOTE: findmyhash.py 2.0 is coming!! The new version will have many changes and improvements. Some of these changes are:

  • Empty hashes recognition
  • Multi-thread analysis
  • Algorithm recognition from the hash value
  • Pause and Resume options
  • Save the results into a file

 

root@kali:~# python
Python 2.7.15+ (default, Aug 31 2018, 11:56:52) 
[GCC 8.2.0] on linux2
Type "help", "copyright", "credits" or "license" for more information.
>>> 
root@kali:~# findmyhash MD5 -h "098f6bcd4621d373cade4e832627b4f6"

Cracking hash: 098f6bcd4621d373cade4e832627b4f6

Analyzing with bigtrapeze (http://www.bigtrapeze.com)...
... hash not found in bigtrapeze

Analyzing with hashchecker (http://www.hashchecker.com)...
... hash not found in hashchecker

Analyzing with md5hashcracker (http://md5hashcracker.appspot.com)...
... hash not found in md5hashcracker

Analyzing with passcracking (http://passcracking.com)...
... hash not found in passcracking

Analyzing with askcheck (http://askcheck.com)...
... hash not found in askcheck

Analyzing with fox21 (http://cracker.fox21.at)...
... hash not found in fox21

Analyzing with nicenamecrew (http://crackfoo.nicenamecrew.com)...
... hash not found in nicenamecrew

Analyzing with joomlaaa (http://joomlaaa.com)...
... hash not found in joomlaaa

Analyzing with md5-lookup (http://md5-lookup.com)...
... hash not found in md5-lookup

Analyzing with md5.com.cn (http://md5.com.cn)...
... hash not found in md5.com.cn

Analyzing with digitalsun.pl (http://md5.digitalsun.pl)...
... hash not found in digitalsun.pl

Analyzing with drasen.net (http://md5.drasen.net)...
... hash not found in drasen.net

Analyzing with myinfosec (http://md5.myinfosec.net)...
... hash not found in myinfosec

Analyzing with md5.net (http://md5.net)...
... hash not found in md5.net

Analyzing with noisette.ch (http://md5.noisette.ch)...
... hash not found in noisette.ch

Analyzing with md5hood (http://md5hood.com)...
... hash not found in md5hood

Analyzing with stringfunction (http://www.stringfunction.com)...
... hash not found in stringfunction

Analyzing with 99k.org (http://xanadrel.99k.org)...
... hash not found in 99k.org

Analyzing with sans (http://isc.sans.edu)...
... hash not found in sans

Analyzing with bokehman (http://bokehman.com)...
... hash not found in bokehman

Analyzing with goog.li (http://goog.li)...
... hash not found in goog.li

Analyzing with schwett (http://schwett.com)...
... hash not found in schwett

Analyzing with netmd5crack (http://www.netmd5crack.com)...
... hash not found in netmd5crack

Analyzing with md5-cracker (http://www.md5-cracker.tk)...
... hash not found in md5-cracker

Analyzing with benramsey (http://tools.benramsey.com)...
... hash not found in benramsey

Analyzing with gromweb (http://md5.gromweb.com)...
... hash not found in gromweb

Analyzing with hashcracking (http://md5.hashcracking.com)...
... hash not found in hashcracking

Analyzing with hashcracking (http://victorov.su)...
... hash not found in hashcracking

Analyzing with thekaine (http://md5.thekaine.de)...
... hash not found in thekaine

Analyzing with tmto (http://www.tmto.org)...
... hash not found in tmto

Analyzing with rednoize (http://md5.rednoize.com)...
... hash not found in rednoize

Analyzing with md5-db (http://md5-db.de)...
... hash not found in md5-db

Analyzing with my-addr (http://md5.my-addr.com)...

***** HASH CRACKED!! *****
The original string is: test


The following hashes were cracked:
----------------------------------

098f6bcd4621d373cade4e832627b4f6 -> test

 

‧ 有人方便窮舉

/brute

Simple brute forcing in Python.

brute

PyPI Version PyPI Downloads Travis Build Status

Simple brute forcing in Python.

Devil Sketch

Purpose

Brute forcing passwords, and other things often requires a bit of hacking to get working properly.

This library makes generating all possible permutations of strings really easy — and is very customizable.

You can then brute force whatever you want, however you want >:)

root@kali:~# python
Python 2.7.15+ (default, Aug 31 2018, 11:56:52) 
[GCC 8.2.0] on linux2
Type "help", "copyright", "credits" or "license" for more information.
>>> from brute import brute
>>> n = 0
>>> for s in brute():
...     n = n + 1
... 
>>> print n
839514
>>>

 

‧ 也有人綜合發展

/HASHCat

A Python Script For BrtuForce Attack On Multi HASHES YOU CAN BRTU-FORCE ATTACK ON THIS HASHES [ MD5, SHA1, SHA224, SHA256, SHA384, SHA512 ] Using this Script 🙂

HASHCat,V2.5

A Python Script For BrtuForce Attack On Multi HASHES YOU CAN BRTU-FORCE ATTACK ON THIS HASHES [ MD5, SHA1, SHA224, SHA256, SHA384, SHA512 ] Using this Script 🙂

  • Tool ScreenShots.
    • HASHCAT OPTIONS: usage

 

root@kali:~/test/HASHCat# ./HASHCat.py -H  5eb63bbbe01eeed093cb22bb8f5acdc3 -W ../rockyou.txt 

 __  __     ______     ______     __  __     ______     ______     ______  
/\ \_\ \   /\  __ \   /\  ___\   /\ \_\ \   /\  ___\   /\  __ \   /\__  _\ 
\ \  __ \  \ \  __ \  \ \___  \  \ \  __ \  \ \ \____  \ \  __ \  \/_/\ \/ 
 \ \_\ \_\  \ \_\ \_\  \/\_____\  \ \_\ \_\  \ \_____\  \ \_\ \_\    \ \_\ 
  \/_/\/_/   \/_/\/_/   \/_____/   \/_/\/_/   \/_____/   \/_/\/_/     \/_/                                                                            
    ---------------------------------------------------------------------
    [+>]=====>> By: Oseid Aldary <<=====[-]====>> Version: 2.5 <<====[<+]
    ---------------------------------------------------------------------

[+>]<====================> CONFIG <====================>[<+]

[*] HASH NAME    :> [ MD5
[+] HASH         :> [ 5eb63bbbe01eeed093cb22bb8f5acd-...
[>] Wordlist     :> [ ../rockyou.txt
[@] Words Loaded :> [ 14344392
...

[!]:Trying Password[933478]  : hello!!!!


[+]:HASH CRACK!:
[*]:INFO:
----------
[*]:HASH Name:[ MD5 ] 
[+]:HASH:[ 5eb63bbbe01eeed093cb22bb8f5acdc3 ]

[#>]:HASH CAT:[ hello world ]

 

或希望『素客』們,不要掉以輕心的啊☆★