README 3.3 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798
  1. ================================================================
  2. Introduction:
  3. ==============================
  4. Captcha Intruder is an automatic pentesting tool to bypass captchas.
  5. ================================================================
  6. Options and features:
  7. ==============================
  8. cintruder [OPTIONS]
  9. Options:
  10. --version show program's version number and exit
  11. -h, --help show this help message and exit
  12. -v, --verbose active verbose mode output results
  13. --proxy=PROXY use proxy server (tor: http://localhost:8118)
  14. --gui run GUI (CIntruder Web Interface)
  15. --update check for latest stable version
  16. ->Tracking:
  17. --track=TRACK download captchas from url (to: 'inputs/')
  18. --track-num=S_NUM set number of captchas to download (default: 5)
  19. ->Training:
  20. --train=TRAIN train using common OCR techniques
  21. --set-id=SETIDS set colour's ID manually (use -v for details)
  22. ->Cracking:
  23. --crack=CRACK brute force using local dictionary
  24. ->Modules (training/cracking):
  25. --list list available modules (from: 'mods/')
  26. --mod=NAME set a specific OCR exploiting module
  27. ->Post-Exploitation (cracking):
  28. --xml=XML export result to xml format
  29. --tool=COMMAND replace suggested word on commands of another tool. use
  30. 'CINT' marker like flag (ex: 'txtCaptcha=CINT')
  31. ================================================================
  32. Examples of usage:
  33. ==============================
  34. -------------------
  35. * View help:
  36. $ ./cintruder --help
  37. -------------------
  38. * Update to latest version:
  39. $ ./cintruder --update
  40. -------------------
  41. * Launch web interface (GUI):
  42. $ ./cintruder --gui
  43. -------------------
  44. * Simple crack from file:
  45. $ ./cintruder --crack "inputs/captcha.gif"
  46. -------------------
  47. * Simple crack from URL:
  48. $ ./cintruder --crack "http://host.com/path/captcha_url"
  49. -------------------
  50. * Simple crack from local, exporting results to a xml file:
  51. $ ./cintruder --crack "inputs/captcha.gif" --xml "test.xml"
  52. -------------------
  53. * Simple crack from url, with proxy TOR and verbose output:
  54. $ ./cintruder --crack "http://host.com/path/captcha_url" --proxy="http://127.0.0.1:8118" -v
  55. -------------------
  56. * Train captcha(s) from url, with proxy TOR and verbose output:
  57. $ ./cintruder --train "http://host.com/path/captcha_url" --proxy "http://127.0.0.1:8118" -v
  58. -------------------
  59. * Track 50 captcha(s) from url, with proxy TOR:
  60. $ ./cintruder --track "http://host.com/path/captcha.gif" --track-num "50" --proxy "http://127.0.0.1:8118"
  61. -------------------
  62. * List available modules (from "mods/"):
  63. $ ./cintruder --list
  64. -------------------
  65. * Launch an OCR module to train a specific local captcha:
  66. $ ./cintruder --train "inputs/easycaptcha.gif" --mod "module_invocation_name"
  67. -------------------
  68. * Launch an OCR module to crack a specific online captcha, with verbose output:
  69. $ ./cintruder --crack "http://host.com/path/captcha_url" --mod "module_invocation_name" -v
  70. -------------------
  71. * Replace suggested word by CIntruder after cracking a remote url on commands of another tool (ex: "XSSer"):
  72. $ ./cintruder --crack "http://host.com/path/captcha_url" --tool "xsser -u http://host.com/path/param1=foo&param2=bar&txtCaptcha=CINT"
  73. -------------------