Execises to connect to websites.
- Open up Firefox 45.0 and Firefox Developer toolbar, select the
Network Monitor
tab - Go to the website and try to post a vote.
- Observe post request. Right click and select
Copy as cURL
- Paste the curl request in a terminal session, and hit enter. Refresh the page to see if it worked.
- If it did, put it in a for loop in bash.
for ((i=0;i < 1025; i++)); do curl blahblahblah; done
This works for the first three tasks, then captcha and time restraints come into play. For the next three tasks, google it. Results are below.
A simple program written in C to output random floating values for the sleep function, to simulate human interaction, instead of the rhythmic POST-ing of a bot The program random_sleep.c compiled with ``gcc -Wall -Werror -Wextra -pedantic random_sleep.c -o random_sleep`` Simple shell script to curl a POST request 1024 times as a windows user and a cookie. After, it sleeps for a random amount of time between 0.0 and 10.0 seconds. Compiled randomizer function. Simple shell script to curl a POST request 1024 times as a windows user and a cookie. After, it sleeps for a random amount of time between 0.0 and 10.0 seconds. Compiled randomizer function. Simple shell script to curl a POST request 1024 times as a windows user and a cookie. After, it sleeps for a random amount of time between 0.0 and 10.0 seconds. Compiled randomizer function. A simple Python2 script to bypass capchas #### Links * [Bypass Capcha using Python and Tesseract](http://www.debasish.in/2012/01/bypass-captcha-using-python-and.html)- Install tesseract:
sudo pip install pytesseract
tesseract uses the deprecated Python package, PIL. To install the updated version, pillow, I had to install a number of dependencies.
1. ``sudo apt-get update`` 2. ``sudo apt-get install zlib1g-dev`` 3. ``sudo apt-get install tesseract-orc`` 4. ``sudo pip install pillow`` Compiled randomizer function. A simple Python2 script to tunnel through the TOR network, using random IP addresses, and POST-ing.- Primary Tutorial - from sacharya.com
- Install Tor
- Install Privoxy
- Install PyTorCtl
- Install TOR:
sudo apt-get update; sudo apt-get install tor; sudo /etc/init.d/tor restart
- Configure TOR:
tor --hash-password password; sed -i 's/#ControlPort 9051/ControlPort 9051/;s/#HashedControlPassword/HashedControlPassword/ /etc/tor/torrc
- Install PyTorCtl:
git clone git://github.com/aaronsw/pytorctl.git; sudo pip install pytorctl/
- Install Privoxy:
sudo apt-get install privoxy
- Configure Privoxy:
sudo sed -i '1338s/^#/forward-socks5 \/localhost:9050 ./' /etc/privoxy/config
- Restart privoxy and tor:
sudo /etc/init.d/privoxy restart; sudo /etc/init.d/tor restart
- Run with
sudo ip_renew.py | grep "" | grep -A3 "28 "
To see the results only for the id number 28.