def main(): acc = sys.argv[1] expect_hash_res = Accounts_Pass_Pairs[acc] salt = Extract_Data.getSalt(expect_hash_res) file = open("wordsEn.txt", "r") for password in file: password = password[:-2] if len(password) < 6: continue continual_cap_pass = password for i in range(0, len(password)): capitalized_letter = password[i:i + 1] capitalized_letter = capitalized_letter.upper() capitalized_i_letter_pass = password[: i] + capitalized_letter + password[ i + 1:] hash_res1 = Extract_Data.Crypt(capitalized_i_letter_pass, salt) if (hash_res1 == expect_hash_res): print "{}:{}".format(acc, capitalized_i_letter_pass) return continual_cap_pass = continual_cap_pass[: i] + capitalized_letter + continual_cap_pass[ i + 1:] hash_res2 = Extract_Data.Crypt(continual_cap_pass, salt) if (hash_res2 == expect_hash_res): print "{}:{}".format(acc, continual_cap_pass) return file.close()
def main(): acc = 'j_snow' expect_hash_res = Accounts_Pass_Pairs[acc] salt = Extract_Data.getSalt(expect_hash_res) file = open("wordsEn.txt", "r") for password in file: password = password[:-2] if len(password) > 8: continue for char in Substitutions: password = password.replace(char, Substitutions[char]) if len(password) < 8: diff = 8 - len(password) for i in range(1, diff + 1): allCombos = itertools.product(NUMBERS, repeat=i) for combo in allCombos: appending = "" for each_word in combo: appending = appending + each_word mod_password = password + appending hash_res = Extract_Data.Crypt(mod_password, salt) if (hash_res == expect_hash_res): print "{}:{}".format(acc, mod_password) return file.close()
def main(): Accounts_Pass_Pairs = Extract_Data.getAccountsAndPassHashes() for acc in Accounts_Pass_Pairs: found = False password_hash = Accounts_Pass_Pairs[acc] salt = Extract_Data.getSalt(password_hash) file = open('wordsEn.txt', 'r') for password in file: password = password[:-2] if (len(password) < 6): continue continual_mod_password = password for char in Substitutions: mod_password = password.replace(char, Substitutions[char]) continual_mod_password = continual_mod_password.replace( char, Substitutions[char]) hash_res1 = Extract_Data.Crypt(mod_password, salt) hash_res2 = Extract_Data.Crypt(continual_mod_password, salt) if (hash_res1 == password_hash): print "{}:{}".format(acc, mod_password) found == True break if (hash_res2 == password_hash): print "{}:{}".format(acc, continual_mod_password) found == True break if found == True: break file.close()
def main(): Accounts_Pass_Pairs = Extract_Data.getAccountsAndPassHashes() target = 'j_snow' password_hash = Accounts_Pass_Pairs[target] salt = Extract_Data.getSalt(password_hash) for i in range(6, 9): allCombos = itertools.product(NUMBERS, repeat=i) for combo in allCombos: password = "" for each_word in combo: password = password + each_word hash_res = Extract_Data.Crypt(password, salt) if (hash_res == password_hash): print "{}:{}".format(target, password) return
def GetPosition(inputFile='ESP_Logs\ESP_Log_Prtot3Test.txt'): NetworkIDs = ["Test_00", "Test_10", "Test_02", "Test_11"] NetworkLocations = [[0, 0], [0, 2.5], [4.5, 0], [4.5, 2.5]] NetworkRSSIs = [[], [], [], []] NetworkDistances = [[], [], [], []] Points = [] Scansest = ED.Extract_Scans(inputFile) counter = 0 for k in NetworkIDs: for i in Scansest: for j in range(0, len(i[4])): if i[4][j] == k: NetworkRSSIs[counter].append(i[5][j]) counter = counter + 1 testvalues = [-41, -41, -36, -42, -44, -39, -39, -44, -42, -45] testvaluesshort = [-34, -38, -38, -39, -38, -39, -41, -39, -38, -40] sumv = 0 for i in testvalues: sumv = sumv + i A0 = sumv / len(testvalues) counter = 0 for k in NetworkRSSIs: d = RSSI_C.RSSI_to_Distance(k, A_0=A0) NetworkDistances[counter] = d counter = counter + 1 Points = trilaterate2D(NetworkLocations, NetworkDistances) return Points
def GetPosition(inputFile='ESP_Logs\ESP_Log_Prtot3Test.txt'): NetworkIDs = ["uniwide", "UNSW Guest", "eduroam", "Global_Students"] NetworkLocations = [[0, 0], [0, 2.5], [4.5, 0], [4.5, 2.5]] NetworkRSSIs = [[], [], [], []] NetworkDistances = [[], [], [], []] Points = [] PosTimes = [] Scansest = ED.Extract_Scans(inputFile) counter = 0 for k in NetworkIDs: for i in Scansest: PosTimes.append(i[6][0]) for j in range(0, len(i[4])): if i[4][j] == k: NetworkRSSIs[counter].append(i[5][j]) counter = counter + 1 testvalues = [-41, -41, -36, -42, -44, -39, -39, -44, -42, -45] testvaluesshort = [-34, -38, -38, -39, -38, -39, -41, -39, -38, -40] sumv = 0 for i in testvalues: sumv = sumv + i A0 = sumv / len(testvalues) counter = 0 for k in NetworkRSSIs: d = RSSI_C.RSSI_to_Distance(k, A_0=A0) NetworkDistances[counter] = d counter = counter + 1 print(len(NetworkDistances[0])) Points = trilaterate2D(NetworkLocations, NetworkDistances) return [Points, PosTimes]
def main(): Accounts_Pass_Pairs = Extract_Data.getAccountsAndPassHashes() target = 'tyrion_lannister' password_hash = Accounts_Pass_Pairs[target] salt = Extract_Data.getSalt(password_hash) i = 5 while True: i = i + 1 allCombos = itertools.product(LOWERCASE_ALPHA, repeat=i) for combo in allCombos: password = "" for each_word in combo: password = password + each_word hash_res = Extract_Data.Crypt(password, salt) if(hash_res == password_hash): print "{}:{}".format(target, password) return
def main(): Accounts_Pass_Pairs = Extract_Data.getAccountsAndPassHashes() acc = 'targaryend' password_hash = Accounts_Pass_Pairs[acc] salt = Extract_Data.getSalt(password_hash) i = 5 while True: i = i + 1 allCombos = itertools.product(NUMBERS, repeat=i) for combo in allCombos: password = "" for each_word in combo: password = password + each_word hash_res = Extract_Data.Crypt(password, salt) if (hash_res == password_hash): print "{}:{}".format(acc, password) return
def main(): append_list = [] for i in range(1, 5): allCombos = itertools.product(NUMBERS, repeat=i) for combo in allCombos: appending = "" for each_word in combo: appending = appending + each_word append_list.append(appending) Accounts_Pass_Pairs = Extract_Data.getAccountsAndPassHashes() if len(sys.argv) == 1: for acc in Accounts_Pass_Pairs: expect_hash_res = Accounts_Pass_Pairs[acc] salt = Extract_Data.getSalt(expect_hash_res) # Dictionary Attack file = open("wordsEn.txt", "r") for password in file: password = password[:-2] for each_appending in append_list: mod_password = password + each_appending hash_res = Extract_Data.Crypt(mod_password, salt) if (hash_res == expect_hash_res): print "{}:{}".format(acc, mod_password) file.close() return else: acc = sys.argv[1] expect_hash_res = Accounts_Pass_Pairs[acc] salt = Extract_Data.getSalt(expect_hash_res) # Dictionary Attack file = open("wordsEn.txt", "r") for password in file: password = password[:-2] for each_appending in append_list: mod_password = password + each_appending hash_res = Extract_Data.Crypt(mod_password, salt) if (hash_res == expect_hash_res): print "{}:{}".format(acc, mod_password) file.close() return
def main(): train_df, test_df = Extract_Data.ExtractDataFeatures( train_dir='TrainRawData', test_dir=None) #temp_df = train_df.copy() #df = pd.concat([temp_df.loc[:,'mean_1':'Global_Maximum'], temp_df['Label']], axis=1) classifiers = [ 'LogisticRegression', 'RandomForest', 'SVM', 'DecisionTreeClassifier', 'KNeighborsClassifier', 'GaussianNB', 'VotingClassifier' ] for cname in classifiers: CrossValidation(train_df, cname, 10)
def main(): append_list = [] for i in range(1, 6): allCombos = itertools.product(NUMBERS, repeat=i) for combo in allCombos: appending = "" for each_word in combo: appending = appending + each_word append_list.append(appending) Accounts_Pass_Pairs = Extract_Data.getAccountsAndPassHashes() for acc in Accounts_Pass_Pairs: found = False password_hash = Accounts_Pass_Pairs[acc] salt = Extract_Data.getSalt(password_hash) file = open('wordsEn.txt', 'r') for password in file: password = password[:-2] if (len(password) < 6): continue continual_mod_password = password for char in Substitutions: continual_mod_password = continual_mod_password.replace( char, Substitutions[char]) for each_appending in append_list: number_padded_mod_password = continual_mod_password + each_appending hash_res = Extract_Data.Crypt(number_padded_mod_password, salt) if (hash_res == password_hash): print "{}:{}".format(acc, number_padded_mod_password) found = True break if found == True: break if found == True: break file.close()
import Extract_Data import string import sys Accounts_Pass_Pairs = Extract_Data.getAccountsAndPassHashes() def main(): acc = sys.argv[1] expect_hash_res = Accounts_Pass_Pairs[acc] salt = Extract_Data.getSalt(expect_hash_res) file = open("wordsEn.txt", "r") for password in file: password = password[:-2] if len(password) < 6: continue continual_cap_pass = password for i in range(0, len(password)): capitalized_letter = password[i:i + 1] capitalized_letter = capitalized_letter.upper() capitalized_i_letter_pass = password[: i] + capitalized_letter + password[ i + 1:] hash_res1 = Extract_Data.Crypt(capitalized_i_letter_pass, salt) if (hash_res1 == expect_hash_res): print "{}:{}".format(acc, capitalized_i_letter_pass) return continual_cap_pass = continual_cap_pass[: i] + capitalized_letter + continual_cap_pass[ i + 1:] hash_res2 = Extract_Data.Crypt(continual_cap_pass, salt)
def findMapping(yhat, bucketedData): mapping = dict() count = dict() for (row1, row2) in zip(yhat, bucketedData): if (row1[0] not in count): count[row1[0]] = [0 for i in range(10)] count[row1[0]][row2] += 1 print(count) for i in range(0, 10): mapping[i] = count[i].index(max(count[i])) return mapping if __name__ == "__main__": _, df = Extract_Data.ExtractDataFeatures(train_dir=None, test_dir='RawTestData') #df, _ = Extract_Data.ExtractDataFeatures(train_dir="TrainRawData", test_dir=None) #carbData = readCarbData("CarbData", "TrainRawData") #bucketedData = bucketList(carbData) pca = loadModel('pca-weights') minmax = loadModel('minmax-weights') X_test = df.values X_test = minmax.transform(pd.DataFrame(X_test)) X_test = pca.transform(pd.DataFrame(X_test)) for cname in ['KMeans', 'DBScan']: print('Predicting the cluster assignment using ' + cname) clf = loadModel(cname) if cname == 'KMeans': yhat = clf.predict(X_test) else:
colors = plt.cm.jet(np.linspace(0, 1, k)) ax.margins(0.05) for (name, group), color in zip(groups, colors): ax.plot(group.dim_1, group.dim_2, marker='o', linestyle='', ms=8, label=name, color=color) ax.legend() plt.show() if cname == 'KMeans': print("Sum of Squared Error with n_clusters= {} is: {}".format( n_clusters, sse)) saveModel(clf, cname) if __name__ == '__main__': df, _ = Extract_Data.ExtractDataFeatures(train_dir='TrainRawData', test_dir=None) X = df.iloc[:, :-1].values #pca, X_train_df, minmax = PCA_Reduction.PCAReduction(pd.DataFrame(X), 2, 'tsne') pca, X_train_df, minmax = PCA_Reduction.PCAReduction(pd.DataFrame(X), 2) X = X_train_df.values for cname in ['KMeans', 'DBScan']: cluster(X, cname, 10) saveModel(pca, 'pca-weights') saveModel(minmax, 'minmax-weights')
import Extract_Data Accounts_Pass_Pairs = Extract_Data.getAccountsAndPassHashes() for acc in Accounts_Pass_Pairs: expect_hash_res = Accounts_Pass_Pairs[acc] salt = Extract_Data.getSalt(expect_hash_res) # Common Passwords Attack file = open("rockyou.txt", "r") for password in file: password = password[:-2] hash_res = Extract_Data.Crypt(password, salt) if (hash_res == expect_hash_res): print "{}:{}".format(acc, password) break file.close()
def main(): X, Y = ED.Extract_Data() Y = smooth_plot(Y) draw_plot(X, Y)