123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101 |
- ================================================================
- Introduction:
- ==============================
- Captcha Intruder is an automatic pentesting tool to bypass captchas.
- ================================================================
- Options and features:
- ==============================
-
- cintruder [OPTIONS]
- Options:
- --version show program's version number and exit
- -h, --help show this help message and exit
- -v, --verbose active verbose mode output results
- --proxy=PROXY use proxy server (tor: http://localhost:8118)
- --gui run GUI (CIntruder Web Interface)
- --update check for latest stable version
- ->Tracking:
- --track=TRACK download captchas from url (to: 'inputs/')
- --track-num=S_NUM set number of captchas to download (default: 5)
- --tracked-list list last tracked captchas (from: 'inputs/')
- ->Configuration (training/cracking):
- --set-id=SETIDS set colour's ID manually (use -v for details)
- ->Training:
- --train=TRAIN train using common OCR techniques
- ->Cracking:
- --crack=CRACK brute force using local dictionary
- ->Modules (training/cracking):
- --mod=NAME set a specific OCR exploiting module
- --mods-list list available modules (from: 'mods/')
- ->Post-Exploitation (cracking):
- --xml=XML export result to xml format
- --tool=COMMAND replace suggested word on commands of another tool. use
- 'CINT' marker like flag (ex: 'txtCaptcha=CINT')
- ================================================================
- Examples of usage:
- ==============================
- -------------------
- * View help:
- $ ./cintruder --help
- -------------------
- * Update to latest version:
- $ ./cintruder --update
- -------------------
- * Launch web interface (GUI):
- $ ./cintruder --gui
- -------------------
- * Simple crack from file:
- $ ./cintruder --crack "inputs/captcha.gif"
- -------------------
- * Simple crack from URL:
- $ ./cintruder --crack "http://host.com/path/captcha_url"
- -------------------
- * Simple crack from local, exporting results to a xml file:
- $ ./cintruder --crack "inputs/captcha.gif" --xml "test.xml"
- -------------------
- * Simple crack from url, with proxy TOR and verbose output:
- $ ./cintruder --crack "http://host.com/path/captcha_url" --proxy="http://127.0.0.1:8118" -v
- -------------------
- * Train captcha(s) from url, with proxy TOR and verbose output:
- $ ./cintruder --train "http://host.com/path/captcha_url" --proxy "http://127.0.0.1:8118" -v
- -------------------
- * Track 50 captcha(s) from url, with proxy TOR:
- $ ./cintruder --track "http://host.com/path/captcha.gif" --track-num "50" --proxy "http://127.0.0.1:8118"
- -------------------
- * List available modules (from "mods/"):
- $ ./cintruder --list
- -------------------
- * Launch an OCR module to train a specific local captcha:
- $ ./cintruder --train "inputs/easycaptcha.gif" --mod "module_invocation_name"
- -------------------
- * Launch an OCR module to crack a specific online captcha, with verbose output:
- $ ./cintruder --crack "http://host.com/path/captcha_url" --mod "module_invocation_name" -v
- -------------------
- * Replace suggested word by CIntruder after cracking a remote url on commands of another tool (ex: "XSSer"):
- $ ./cintruder --crack "http://host.com/path/captcha_url" --tool "xsser -u http://host.com/path/param1=foo¶m2=bar&txtCaptcha=CINT"
- -------------------
|