search

Home  >  Q&A  >  body text

Two ideas: python simulates the login page and simulates operating the windows program window to submit a request

I want to simulate guessing the password of a web login page. Let’s see if it works with two ideas.
That page requires an account password. I know the account.
First, use the requests module to simulate the login page, and provide passwords through the dictionary to submit login requests in a loop. According to the returned information, if successful information is returned, the password will be recorded and stopped.
Second, the other party also provided a desktop exe executable program. Is it possible to simulate the login operation through a module such as pywin32? The password is also obtained by guessing the password through a weak password dictionary.
I had this need a few days ago. My friend said that using python is easy, so I learned python. I want to know if these two ideas work, and if so, which one is more convenient. I usually have other things to do, so I don’t have much time. I really want to know, thank you for your answer!

过去多啦不再A梦过去多啦不再A梦2757 days ago599

reply all(3)I'll reply

  • PHP中文网

    PHP中文网2017-05-18 11:02:14

    First of all, I personally think the first one is simpler.
    Secondly, let’s talk about your need: brute force password cracking! ! ! If the password also contains letters, numbers, special symbols, etc., then if you are lucky, you may get a result after a year and a half.
    Good luck!

    reply
    0
  • 黄舟

    黄舟2017-05-18 11:02:14

    The experiment of requests loop is feasible, but generally website login has a limit on the number of incorrect passwords, verification code issues, and you should also pay attention to whether the website has IP restrictions

    reply
    0
  • 仅有的幸福

    仅有的幸福2017-05-18 11:02:14

    Personally, I don’t think it’s advisable. If you don’t have enough password dictionary basis, trying to use this brute force cracking method to obtain passwords is basically equivalent to finding a needle in a haystack. Besides, if the other party has a web firewall, you can basically use both methods. It’s time to stop cooking!

    reply
    0
  • Cancelreply