当前位置:网站首页>Each account corresponds to all passwords, and then each password corresponds to all accounts. How to write the brute force cracking code
Each account corresponds to all passwords, and then each password corresponds to all accounts. How to write the brute force cracking code
2022-07-28 16:38:00 【Python advanced】
Click on the above “Python Home of sharing ”, Focus on
reply “ resources ” You can get a gift Python Learning materials
today
Japan
chicken
soup
To return to service in another country , Stay at the lonely grave in Mabei .
Hello everyone , I'm Pippi .
One 、 Preface
A few days ago Python The strongest King exchange group 【 lonely 】 Asked a question Python Issues dealt with , As shown in the figure below .

Now there are two account and password explosion files , Want to try every account number corresponding to all passwords first, and then try every password corresponding to all accounts .
In fact, each account corresponds to the password once , There is no need for each password to correspond to the account number again .
Two 、 Implementation process
In fact, I was cracking this problem before my neighbor's little sister wifi When it comes to passwords , I've thought about it , But there was no action , Just think about it, and then there's no .
here 【D I Y】 Gave an answer , Regardless of efficiency , Use double loop to force write .

later 【 Mr. Yu Liang 】 A sample code is given , As shown below :
pw = [1,2,3,4,5]
user = ['a','b','c']
for i in user:
for j in pw:
print(i, j)After running , The result is as follows :
Even if the number of lines in the password file of two accounts ( password 7 Thousands of lines , account number 8 Thousands of lines ) It doesn't matter if it doesn't . Because of all the circumstances , Can be traversed .l

If there is a problem , Feel free to contact me to solve , Welcome to my Python Learning exchange group .
3、 ... and 、 summary
Hello everyone , I'm Pippi . This article mainly makes an inventory of Python The problem of data processing , In this paper, the specific analysis and code implementation are given , Help the fans solve the problem smoothly .
Finally, thank the fans 【 lonely 】 put questions to , thank 【 Mr. Yu Liang 】、【DIY】 Given the idea and code analysis , thank 【dcpeng】 And others participate in learning and communication .
friends , Practice it quickly ! If in the process of learning , Any problems encountered , Welcome to add my friend , I'll pull you in Python The learning exchange group discusses learning together .

------------------- End -------------------
Excellent articles in the past are recommended :

Welcome to give the thumbs-up , Leaving a message. , forward , Reprint , Thank you for your company and support
Want to join Python Learning group, please reply in the background 【 Enter into Group 】
All rivers and mountains are always in love , Order one 【 Looking at 】 OK?
边栏推荐
- Ansa secondary development - Introduction to interface development tools
- LwIP development | socket | DNS domain name resolution
- Redis系列4:高可用之Sentinel(哨兵模式)
- Curl returns blank or null without output. Solve the problem
- Record doc
- 2021-04-02
- El input limit can only input the specified number
- Use js direct OSS to store files in Alibaba cloud and solve the limitation of large file upload server
- Huada chip hc32f4a0 realizes RS485 communication DMA transceiver
- 2021-04-02
猜你喜欢

Kubeedge releases white paper on cloud native edge computing threat model and security protection technology

Wei Jianjun couldn't catch up with Li Shufu by riding a BMW

Roson的Qt之旅#101 Qt Quick中的模型和视图

Sort 2 bubble sort and quick sort (recursive and non recursive explanation)

500million users, four years earlier than wechat... This app, which has been in operation for 15 years, will be permanently discontinued

排序4-堆排序与海量TopK问题

Headline article_ signature

IM即时通讯开发优化提升连接成功率、速度等

WSL+Valgrind+Clion

flashfxp 530 User cannot log in. ftp
随机推荐
使用js直传oss阿里云存储文件,解决大文件上传服务器限制
Ansa secondary development - build ansa/meta secondary development environment on pycharm
Wei Jianjun couldn't catch up with Li Shufu by riding a BMW
redis源码优化--绑核
Kubeedge releases white paper on cloud native edge computing threat model and security protection technology
HM二次开发 - Data Names及其使用
Practical development tutorial of software problem repair tracking system (Part 1)
c语言编程当中两个!!的作用
LwIP development | socket | TCP | client
CRC16数据校验支持ModelBus和XMODEM校验模式(C语言)
“蔚来杯“2022牛客暑期多校训练营3 ACFHJ
Reentrant and non reentrant
About the web docking pin printer, lodop uses
Image semantic segmentation practice: tensorflow deeplobv3+ train your own dataset
Darknet training yolov4 record
Sdl2 concise tutorial (4): using SDL_ Image library importing pictures
2021-04-02
Ansa secondary development - two methods of drawing the middle surface
flashfxp 530 User cannot log in. ftp
“蔚来杯“2022牛客暑期多校训练营3 A.Ancestor LCA+暴力计数