| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798 | ================================================================Introduction:==============================Captcha Intruder is an automatic pentesting tool to bypass captchas.================================================================Options and features:============================== cintruder [OPTIONS]Options:  --version            show program's version number and exit  -h, --help           show this help message and exit  -v, --verbose        active verbose mode output results  --proxy=PROXY        use proxy server (tor: http://localhost:8118)  --gui                run GUI (CIntruder Web Interface)  --update             check for latest stable version  ->Tracking:    --track=TRACK      download captchas from url (to: 'inputs/')    --track-num=S_NUM  set number of captchas to download (default: 5)  ->Training:    --train=TRAIN      train using common OCR techniques    --set-id=SETIDS    set colour's ID manually (use -v for details)  ->Cracking:    --crack=CRACK      brute force using local dictionary  ->Modules (training/cracking):    --list             list available modules (from: 'mods/')    --mod=NAME         set a specific OCR exploiting module  ->Post-Exploitation (cracking):    --xml=XML          export result to xml format    --tool=COMMAND     replace suggested word on commands of another tool. use                       'CINT' marker like flag (ex: 'txtCaptcha=CINT')================================================================Examples of usage:==============================-------------------* View help:$ ./cintruder --help-------------------* Update to latest version:$ ./cintruder --update-------------------* Launch web interface (GUI):$ ./cintruder --gui-------------------* Simple crack from file:$ ./cintruder --crack "inputs/captcha.gif"-------------------* Simple crack from URL:$ ./cintruder --crack "http://host.com/path/captcha_url"-------------------* Simple crack from local, exporting results to a xml file:$ ./cintruder --crack "inputs/captcha.gif" --xml "test.xml"-------------------* Simple crack from url, with proxy TOR and verbose output:$ ./cintruder --crack "http://host.com/path/captcha_url" --proxy="http://127.0.0.1:8118" -v-------------------* Train captcha(s) from url, with proxy TOR and verbose output:$ ./cintruder --train "http://host.com/path/captcha_url" --proxy "http://127.0.0.1:8118" -v-------------------* Track 50 captcha(s) from url, with proxy TOR:$ ./cintruder --track "http://host.com/path/captcha.gif" --track-num "50" --proxy "http://127.0.0.1:8118"-------------------* List available modules (from "mods/"):$ ./cintruder --list-------------------* Launch an OCR module to train a specific local captcha:$ ./cintruder --train "inputs/easycaptcha.gif" --mod "module_invocation_name"-------------------* Launch an OCR module to crack a specific online captcha, with verbose output:$ ./cintruder --crack "http://host.com/path/captcha_url" --mod "module_invocation_name" -v-------------------* Replace suggested word by CIntruder after cracking a remote url on commands of another tool (ex: "XSSer"):$ ./cintruder --crack "http://host.com/path/captcha_url" --tool "xsser -u http://host.com/path/param1=foo¶m2=bar&txtCaptcha=CINT"-------------------
 |