Exemple #1
0
    def testSetHashedPassword(self):
        clear_pw = TEST_PW.encode('utf-8')
        u1 = User()
        p1 = Password(clear_pw)
        u1.set_password(p1)

        self.assertEquals(p1, u1.pw)
Exemple #2
0
 def __init__(self, master):
     self.master = master
     self.colour_bg = "Grey"
     self.colour_err = "Red"
     self.draw_widgets()
     self.random_password_size = 15
     self.dbcon = sql.SQLCon()
     self.password = p.Password()
Exemple #3
0
def get_password_hashes(*inputs):
    """Returns password hashes for all inputs (calculated using the same salt)"""
    all_hashes = []

    salt = bcrypt.gensalt()

    for ip in inputs:
        p = Password(TEST_PW.encode('utf-8'))  # use complex password to not fail here

        p.salt = salt
        p.hashed_password = p.hash_password(ip.encode('utf-8'))
        hash_ = p.hashed_password

        all_hashes.append(hash_)

    return all_hashes
def NewPasswordGenerator(numOfPasswords=1):

    U1 = UserInput('What\'s the minimum length?', string.ascii_letters)
    U2 = UserInput('How many special characters?', '!@#$%^&*)-')
    U3 = UserInput('How many numbers?', '0123456789')
    User_Input_List = [U1, U2, U3]

    for x in User_Input_List:
        x.poll_user_input()

    for y in range(numOfPasswords):
        password_final = Password()

        for x in User_Input_List:
            x.generate_random_string()
            password_final.generate_simple_password(x)

        print(password_final.generate_random_password())

    return
 def setUp(self):
     self.pw_hasher = Password.Password()
Exemple #6
0
    def testHashCheck(self):
        pwd = TEST_PW.encode('utf-8')
        p = Password(pwd)

        self.assertTrue(p.hash_check(pwd))
Exemple #7
0
        sleep(5)

    def likeTweet(self, searchfor):
        driver = self.driver
        search_box = driver.find_element_by_xpath(
            '//*[@id="react-root"]/div/div/div[2]/main/div/div/div/div[2]/div/div[2]/div/div/div/div[1]/div/div/div/form/div[1]/div/div/div[2]/input'
        )
        search_box.send_keys(searchfor)
        search_box.send_keys(Keys.RETURN)
        sleep(8)
        for i in range(1, 3):
            #try:
            driver.find_element_by_xpath("//div[@data-testid='like']").click()
            """#except exceptions.NoSuchElementException:
                sleep(3)
                driver.execute_script('window.scrollTo(0,document.body.scrollHeight/2)') 
                sleep(3)
                driver.find_element_by_xpath("//div[@data-testid='like']").click()

            sleep(1)
            driver.execute_script('window.scrollTo(0,document.body.scrollHeight/2)')"""
            sleep(5)


pass_word = Password.Password()
username = Password.user_name()

find = twitter_bot(username, pass_word)
find.login()
find.likeTweet("selenium")
from User import User
from Password import *

#Example to trigger a sonar vulnerability
#import socket
#ip = '127.0.0.1'
#sock = socket.socket()
#sock.bind((ip, 9090))

#typical bandit findings
#>>> bandit -r <folder>
#deprecated md5 will not be found by sonar...
password = input("Please provide a password:"******"Bert")

p = Password()

if p.pwd_complex(password) == True:
    hashed_password = p.hash_password(password.encode())

    user1.set_password(hashed_password)
    hashed_password = user1.get_password()

    p.hash_check(password.encode(), hashed_password)
else:
    print("Doesn't make complexity requirements")
# ---------------------- Database Call ----------------------------------

try:
    conn = pyodbc.connect('Driver={SQL Server Native Client 11.0};'
                          'Server=174.101.154.93;'
                          'Database=PasswordManager;'
                          'uid=bruceba;'
                          'pwd=password')

    # Store return value of a database query in a Panda Data Frame
    value = pd.read_sql_query('select * from tEntries', conn)
    print(value.count())

    # Foreach row value, create a Password Class and store it in a list of Password Classes
    DatabasePasswords = [
        (Password.Password(row.EntryID, row.UserID, row.WebsiteDomainID,
                           row.WebsitePasswordID, row.CategoryID))
        for index, row in value.iterrows()
    ]

    # Foreach Password Class in list of Passwords, print out the EntryID an int
    for x in DatabasePasswords:
        print(int(x.EntryID))

    # print out the length of the array not the count in this instance
    print('Count of Database Passwords: ' + str(len(DatabasePasswords)))

except Exception:
    print('Database Error!!!')

# ------------------------ API Post Call ---------------------------------------
Exemple #10
0
def test_password():
    pwd = Password(context.hash("test_password"), context)

    assert pwd == "test_password", "Comparing against plaintext should work"
    assert pwd != "wrong_password", "not equals should work"