/usr/share/dict/words

sear-turtle

Interesting tip from Robert on Stack Overflow today showed me that there is a nifty little word file built into most Unix based systems (including OSX).

(yep, probably old news to *nix gurus, but for a lifetime Windows guy who only made the switch six months ago this was yet another nice surprise).

The list is here: /usr/share/dict/words

(I have a teammate who has a habit of putting simple passwords on zip files and forgetting to share them with the team).


import sys
import zipfile
 
file_name = "test.zip"
password_file_path = '/usr/share/dict/words'

zipped_file = zipfile.ZipFile(file_name)
password_file = open(password_file_path)
for password_guess in password_file.readlines():
    try:
        zipped_file.extractall(pwd=password_guess.strip())
        print '\n[+] Pass: ' + password_guess.strip() + '\n'
        exit(0)
   except Exception, e:
       sys.stdout.write('.')
       sys.stdout.flush()
 

Nice one funnyman 🙂

Snip20160624_25

from a previous life:

dinosaur

(Dragging my Microsoft posts into one place to get this thing started):

Quickly identifying accounts with pre-auth disabled:

https://blogs.msdn.microsoft.com/canberrapfe/2013/03/18/identify-accounts-with-kerberos-pre-authentication-disabled-in-the-ui/

DirectAccess Connection Process:

https://blogs.msdn.microsoft.com/canberrapfe/2013/01/12/the-direct-access-connection-process-according-to-netmon/

DirectAccess issue on Win7

https://blogs.msdn.microsoft.com/canberrapfe/2012/12/07/direct-access-for-windows-7-works-and-then-it-stops/

Faking “Connected to Internet” status in your lab (NCSI):

https://blogs.msdn.microsoft.com/canberrapfe/2012/10/09/fake-internet-connectivity-for-your-lab-tricking-ncsi/

“Real World” DirectAccess on Server 2012

https://blogs.msdn.microsoft.com/canberrapfe/2012/07/12/real-world-direct-access-installation-using-windows-server-2012/

Going deep with AD: un-hosting/re-hosting partitions:

https://blogs.msdn.microsoft.com/canberrapfe/2012/04/13/un-hosting-re-hosting-active-directory-partitions/

Going deep with AD: Granular replication techniques:

https://blogs.msdn.microsoft.com/canberrapfe/2012/04/11/granular-active-directory-replication-for-advanced-troubleshooting-scenarios/

Basic Network trace using ETL (no wireshark, no netmon):

https://blogs.msdn.microsoft.com/canberrapfe/2012/03/30/capture-a-network-trace-without-installing-anything-capture-a-network-trace-of-a-reboot/

Quick XPERF traces:

https://blogs.msdn.microsoft.com/canberrapfe/2013/05/21/xperf-boot-traces/

Going deep with AD: Change notification:

https://blogs.msdn.microsoft.com/canberrapfe/2012/03/25/active-directory-replication-change-notification-you/

Kerberos Troubleshooting:

https://blogs.msdn.microsoft.com/canberrapfe/2012/01/01/kerberos-troubleshooting/

Bluescreen debug: Beware ‘verifier’ settings in production:

https://blogs.msdn.microsoft.com/canberrapfe/2011/09/02/blue-screen-beware-verifier-settings-on-production-machines/

Quick 100 test users with Powershell:

https://blogs.msdn.microsoft.com/canberrapfe/2011/07/08/create-a-quick-100-users-with-powershell/

Going Deep with AD: Who are my ISTG’s?:

https://blogs.msdn.microsoft.com/canberrapfe/2011/07/08/identify-the-istgs/

Going deep with AD: Dumping the AD database (ntds.dit) to text:

https://blogs.msdn.microsoft.com/canberrapfe/2011/07/08/dumping-the-ad-database/

Going deep with AD: Playing with DCLOCATOR:

https://blogs.msdn.microsoft.com/canberrapfe/2011/07/08/testing-the-dclocator-process/

Going deep with AD: Multiple domain controllers in a site with RODC:

https://blogs.msdn.microsoft.com/canberrapfe/2011/07/08/multiple-domain-controllers-in-a-site-with-a-rodc/

Going deep with AD: Adding attributes to the RODC filtered attribute set:

https://blogs.msdn.microsoft.com/canberrapfe/2011/07/08/adding-attributes-to-the-rodc-filtered-attribute-set/

Forest functional levels – What you get:

https://blogs.msdn.microsoft.com/canberrapfe/2011/07/08/forest-functional-levels-what-you-get/

Domain functional levels – what you get:

https://blogs.msdn.microsoft.com/canberrapfe/2011/07/08/domain-functional-levels-what-you-get/

Troubleshooting dynamic ports:

https://blogs.msdn.microsoft.com/canberrapfe/2011/07/08/portqry-exe-to-troubleshoot-dynamic-ports/

(MCM) Group policy notes:

https://blogs.msdn.microsoft.com/canberrapfe/2011/07/08/group-policy-notes/

(MCM) Kerberos delegation lab:

https://blogs.msdn.microsoft.com/canberrapfe/2011/07/08/kerberos-delegation-lab/

(MCM) Kerberos notes:

https://blogs.msdn.microsoft.com/canberrapfe/2011/07/08/kerberos-notes/

“Preparing Network Connections” promoting a domain controller in a lab:

https://blogs.msdn.microsoft.com/canberrapfe/2011/07/08/preparing-network-connections-domain-controller-in-a-lab/

The “Branch Office Deployment Guide” the original and best way to really understand AD:

https://blogs.msdn.microsoft.com/canberrapfe/2011/07/08/2003-branch-office-deployment-guide/