13 Years of Service
57%

Introduction:
Captcha Intruder is an automatic pentesting tool to bypass captchas.
Installation:
Code runs on many platforms. It requires Python and the following libraries:
- python-pycurl - Python bindings to libcurl
- python-libxml2 - Python bindings for the GNOME XML library
- python-imaging - Python Imaging Library
On Debian-based systems (ex: Ubuntu), run:
Code:
>sudo apt-get install python-pycurl python-libxml2 python-imaging
cintruder [OPTIONS]
Options:
Code:
>--version | show program's version number and exit
-h, --help | show this help message and exit
-v, --verbose | active verbose mode output results
--proxy=PROXY | use proxy server (tor: [url]http://localhost:8118[/url])
--track=TRACK | download captchas from url (to: 'inputs/')
--track-n=TRACKN | number of captchas to track (default: 5)
--train=TRAIN | apply OCR techniques to file
--train-u=TRAINU | apply OCR techniques to url
--crack=CRACK | brute force captchas from file
--crack-u=CRACKU | brute force captchas from url
--xml | export result to xml format
Code:
>--set-id=SETIDS | set colour's id manually (use -v for details)
--editor | launch an editor to apply image filters
* Simple crack from file:
$ python cintruder --crack "captcha.gif"
-------------------
* Simple crack from URL:
$ python cintruder --crack-u "http://host.com/path/captcha.gif"
-------------------
* Simple crack, exporting results to xml file
$ python cintruder --crack "captcha.gif" --xml "test.xml"
-------------------
* Simple crack from URL, with proxy TOR and verbose output
$ python cintruder --crack-u ""http://host.com/path/captcha.gif" --proxy "http://127.0.0.1:8118" -v
-------------------
* Train captcha(s) from url with proxy TOR and verbose output
$ python cintruder --train-u "http://host.com/path/captcha.gif" --proxy="http://127.0.0.1:8118" -v
-------------------
* Track 50 captcha(s) from url with proxy TOR
$ python cintruder --track "http://host.com/path/captcha.gif" --track-n "50" --proxy "http://127.0.0.1:8118"
Video:
Download:
$ python cintruder --crack "captcha.gif"
-------------------
* Simple crack from URL:
$ python cintruder --crack-u "http://host.com/path/captcha.gif"
-------------------
* Simple crack, exporting results to xml file
$ python cintruder --crack "captcha.gif" --xml "test.xml"
-------------------
* Simple crack from URL, with proxy TOR and verbose output
$ python cintruder --crack-u ""http://host.com/path/captcha.gif" --proxy "http://127.0.0.1:8118" -v
-------------------
* Train captcha(s) from url with proxy TOR and verbose output
$ python cintruder --train-u "http://host.com/path/captcha.gif" --proxy="http://127.0.0.1:8118" -v
-------------------
* Track 50 captcha(s) from url with proxy TOR
$ python cintruder --track "http://host.com/path/captcha.gif" --track-n "50" --proxy "http://127.0.0.1:8118"
Video:
This link is hidden for visitors. Please Log in or register now.