This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP D4N155"
m (LOGO) (Tag: Visual edit) |
m |
||
Line 17: | Line 17: | ||
==Description== | ==Description== | ||
− | [[File:Owasp-d4n155-logo.png|thumb|''D4N155 Logo'']] | + | [[File:Owasp-d4n155-logo.png|thumb|''D4N155 Logo'']] |
− | <span | + | <span> |
− | + | On the abstract we can presume that this isn’t just another pentest tool this is a truly powerful tool, that integrate various key features of another projects and ideas of the developers and aggregate then in a same place. | |
</span> | </span> | ||
+ | ==== KEY FEATURES ==== | ||
+ | * Search vulnerable url’s | ||
+ | * Anonymous feature | ||
+ | * Make a smart wordlist based on page content | ||
+ | * Totally CLI (BASH + PYTHON) | ||
+ | * FREE SOFTWARE IN LICENSE(GPL V3) AND IN ESSENCE | ||
+ | * Automatic Report Feature with two options: | ||
+ | ** PDF | ||
+ | ** HTML Where it generate a dynamic graphic for quick visualization | ||
− | |||
− | + | People with bad intentions dedicate a long part of their time to read profiles,posts analyzing then, observing reactions with in order to obtain the maximum information about their targets in order to make their list(of passwords) and the door for attack. Even if you do not have specific knowledge, so you may be using this tool will help you get a sense of how vulnerable you are and consequently take action and prevent a possible attack. | |
− | + | Besides this it’s a friendly tool for a pentester with the features of automatics reports the professional can save time, writing extensive reports with pages of print screens, technician reports and transcription of procedures this tool can make a half of a job for him. | |
+ | |||
+ | ==Operations== | ||
+ | The process of password speculation is performed using various functions, all using recursive ones, as the equation shows. | ||
+ | |||
+ | <code> | ||
+ | λ→(η) = Op. | ||
+ | </code> | ||
+ | |||
+ | ===Combinatorial Analysis=== | ||
+ | The code follows combinatorial analysis in order to speculate passwords and we’ll explain next. | ||
+ | |||
+ | ===Combinatorial Enumerative=== | ||
+ | <code> | ||
+ | Enumerative combinatorial is more classical area of combinatorics and concentrates on counting the number of combinatorial objects | ||
+ | </code> | ||
==Licensing== | ==Licensing== |
Revision as of 16:36, 29 March 2019
Project About
OWASP Tool Project D4N155The project use OSINT for dynamic and smart attack of brute force, until recently, using a complex password based on common things of your day was somewhat advisable, the project somehow creates this possibility of attack but mostly defense DescriptionOn the abstract we can presume that this isn’t just another pentest tool this is a truly powerful tool, that integrate various key features of another projects and ideas of the developers and aggregate then in a same place. KEY FEATURES
Besides this it’s a friendly tool for a pentester with the features of automatics reports the professional can save time, writing extensive reports with pages of print screens, technician reports and transcription of procedures this tool can make a half of a job for him. OperationsThe process of password speculation is performed using various functions, all using recursive ones, as the equation shows.
Combinatorial AnalysisThe code follows combinatorial analysis in order to speculate passwords and we’ll explain next. Combinatorial Enumerative
LicensingGNU GPL v3 License (allows commercial use, but requires that modifications to your code stay open source, thus prohibiting proprietary forks of your project) RoadmapAs of November, 2013, the highest priorities for the next 6 months are:
Subsequent Releases will add
Getting InvolvedInvolvement in the development and promotion of Tool Project Template is actively encouraged! You do not have to be a security expert or a programmer to contribute. Some of the ways you can help are as follows: |
Project ResourcesProject LeaderJulio Pedro de Lira Neto (@jul10l1r4) Related ProjectsClassifications |