據聞今年六月八日,首度俄羅斯有一個命名為『尤金‧古斯特曼』Eugene Goostman 的『人工智慧聊天機器人』通過了圖靈測試。那麼是否一台機器通過了『圖靈測試』就能宣稱它真是具有『智慧』的呢?
二零零二年美國卡內基梅隆大學的 Luis von Ahn、Manuel Blum、Nicholas J.Hopper以及 IBM 的 John Langford 聯合提出了『CAPTCHA』── Completely Automated Public Turing test to tell Computers and Humans Apart ──。一般又叫做『驗證碼』,常常用於『□□下載』網頁,想要確認來下載的『真的是人』。它有著多種形式的設計,常見的是要使用者輸入『扭曲變形』的『文字』或是『數字』,這將使得大多數『OCR』這類圖像文字辨識軟體,無法自動判讀,所以很難寫個『軟體自動下載』。雖說都是『圖靈測試』,一者想『不能分辨』,另者要『能夠區別』,不知最終的『AI』是『能』還是『不能』的呢??
─── 《人工智慧!!》
短短一篇文章
《 How to break a CAPTCHA system in 15 minutes with Machine Learning 》
標誌了一個『新視野』
/CaptchaSolver
based on https://medium.com/@ageitgey/how-to-break-a-captcha-system-in-15-minutes-with-machine-learning-dbebb035a710 by https://github.com/ageitgey https://notebooks.azure.com/run/wegen…
CaptchaSolver Jupyter Notebook
based on https://medium.com/@ageitgey/how-to-break-a-captcha-system-in-15-minutes-with-machine-learning-dbebb035a710 by https://github.com/ageitgey
Before you get started
To run these scripts, you need the following installed:
- Python 3
- OpenCV 3 w/ Python extensions
- I highly recommend these OpenCV installation guides: https://www.pyimagesearch.com/opencv-tutorials-resources-guides/
- The python libraries listed in requirements.txt
- Try running “pip3 install -r requirements.txt”
,『劊客』 AI 紀元之來臨?
『指頭戰爭』的時代,所用武器乃『演算法』以及『概念發想』呦!就像
‧ 有人上網查密碼
findmyhash
findmyhash.py
findmyhash.py try to crack different types of hashes using free online services.
NOTE: findmyhash.py 2.0 is coming!! The new version will have many changes and improvements. Some of these changes are:
- Empty hashes recognition
- Multi-thread analysis
- Algorithm recognition from the hash value
- Pause and Resume options
- Save the results into a file
root@kali:~# python Python 2.7.15+ (default, Aug 31 2018, 11:56:52) [GCC 8.2.0] on linux2 Type "help", "copyright", "credits" or "license" for more information. >>> root@kali:~# findmyhash MD5 -h "098f6bcd4621d373cade4e832627b4f6" Cracking hash: 098f6bcd4621d373cade4e832627b4f6 Analyzing with bigtrapeze (http://www.bigtrapeze.com)... ... hash not found in bigtrapeze Analyzing with hashchecker (http://www.hashchecker.com)... ... hash not found in hashchecker Analyzing with md5hashcracker (http://md5hashcracker.appspot.com)... ... hash not found in md5hashcracker Analyzing with passcracking (http://passcracking.com)... ... hash not found in passcracking Analyzing with askcheck (http://askcheck.com)... ... hash not found in askcheck Analyzing with fox21 (http://cracker.fox21.at)... ... hash not found in fox21 Analyzing with nicenamecrew (http://crackfoo.nicenamecrew.com)... ... hash not found in nicenamecrew Analyzing with joomlaaa (http://joomlaaa.com)... ... hash not found in joomlaaa Analyzing with md5-lookup (http://md5-lookup.com)... ... hash not found in md5-lookup Analyzing with md5.com.cn (http://md5.com.cn)... ... hash not found in md5.com.cn Analyzing with digitalsun.pl (http://md5.digitalsun.pl)... ... hash not found in digitalsun.pl Analyzing with drasen.net (http://md5.drasen.net)... ... hash not found in drasen.net Analyzing with myinfosec (http://md5.myinfosec.net)... ... hash not found in myinfosec Analyzing with md5.net (http://md5.net)... ... hash not found in md5.net Analyzing with noisette.ch (http://md5.noisette.ch)... ... hash not found in noisette.ch Analyzing with md5hood (http://md5hood.com)... ... hash not found in md5hood Analyzing with stringfunction (http://www.stringfunction.com)... ... hash not found in stringfunction Analyzing with 99k.org (http://xanadrel.99k.org)... ... hash not found in 99k.org Analyzing with sans (http://isc.sans.edu)... ... hash not found in sans Analyzing with bokehman (http://bokehman.com)... ... hash not found in bokehman Analyzing with goog.li (http://goog.li)... ... hash not found in goog.li Analyzing with schwett (http://schwett.com)... ... hash not found in schwett Analyzing with netmd5crack (http://www.netmd5crack.com)... ... hash not found in netmd5crack Analyzing with md5-cracker (http://www.md5-cracker.tk)... ... hash not found in md5-cracker Analyzing with benramsey (http://tools.benramsey.com)... ... hash not found in benramsey Analyzing with gromweb (http://md5.gromweb.com)... ... hash not found in gromweb Analyzing with hashcracking (http://md5.hashcracking.com)... ... hash not found in hashcracking Analyzing with hashcracking (http://victorov.su)... ... hash not found in hashcracking Analyzing with thekaine (http://md5.thekaine.de)... ... hash not found in thekaine Analyzing with tmto (http://www.tmto.org)... ... hash not found in tmto Analyzing with rednoize (http://md5.rednoize.com)... ... hash not found in rednoize Analyzing with md5-db (http://md5-db.de)... ... hash not found in md5-db Analyzing with my-addr (http://md5.my-addr.com)... ***** HASH CRACKED!! ***** The original string is: test The following hashes were cracked: ---------------------------------- 098f6bcd4621d373cade4e832627b4f6 -> test
‧ 有人方便窮舉
/brute
Simple brute forcing in Python.
brute
Simple brute forcing in Python.
Purpose
Brute forcing passwords, and other things often requires a bit of hacking to get working properly.
This library makes generating all possible permutations of strings really easy — and is very customizable.
You can then brute force whatever you want, however you want >:)
root@kali:~# python Python 2.7.15+ (default, Aug 31 2018, 11:56:52) [GCC 8.2.0] on linux2 Type "help", "copyright", "credits" or "license" for more information. >>> from brute import brute >>> n = 0 >>> for s in brute(): ... n = n + 1 ... >>> print n 839514 >>>
‧ 也有人綜合發展
/HASHCat
A Python Script For BrtuForce Attack On Multi HASHES YOU CAN BRTU-FORCE ATTACK ON THIS HASHES [ MD5, SHA1, SHA224, SHA256, SHA384, SHA512 ] Using this Script 🙂
HASHCat,V2.5
A Python Script For BrtuForce Attack On Multi HASHES YOU CAN BRTU-FORCE ATTACK ON THIS HASHES [ MD5, SHA1, SHA224, SHA256, SHA384, SHA512 ] Using this Script 🙂
root@kali:~/test/HASHCat# ./HASHCat.py -H 5eb63bbbe01eeed093cb22bb8f5acdc3 -W ../rockyou.txt __ __ ______ ______ __ __ ______ ______ ______ /\ \_\ \ /\ __ \ /\ ___\ /\ \_\ \ /\ ___\ /\ __ \ /\__ _\ \ \ __ \ \ \ __ \ \ \___ \ \ \ __ \ \ \ \____ \ \ __ \ \/_/\ \/ \ \_\ \_\ \ \_\ \_\ \/\_____\ \ \_\ \_\ \ \_____\ \ \_\ \_\ \ \_\ \/_/\/_/ \/_/\/_/ \/_____/ \/_/\/_/ \/_____/ \/_/\/_/ \/_/ --------------------------------------------------------------------- [+>]=====>> By: Oseid Aldary <<=====[-]====>> Version: 2.5 <<====[<+] --------------------------------------------------------------------- [+>]<====================> CONFIG <====================>[<+] [*] HASH NAME :> [ MD5 [+] HASH :> [ 5eb63bbbe01eeed093cb22bb8f5acd-... [>] Wordlist :> [ ../rockyou.txt [@] Words Loaded :> [ 14344392 ... [!]:Trying Password[933478] : hello!!!! [+]:HASH CRACK!: [*]:INFO: ---------- [*]:HASH Name:[ MD5 ] [+]:HASH:[ 5eb63bbbe01eeed093cb22bb8f5acdc3 ] [#>]:HASH CAT:[ hello world ]
或希望『素客』們,不要掉以輕心的啊☆★