本来打算写一套渗透脚本,还没完成,当然了这个也没啥用,破解太麻烦了。
效果
./shadow.py
( 1 ) The user name is -------------------- > root
The user passwd is -------------------- > $6$eZzI9vK0$pmMlJVt/2F2X2oZ42cl8mEwD6/NKYnFt3Z2PhWxA5fFoitnEayhN48.kTrJA9eywaTZxGcylfBkMv0A6IDlVP0
( 35 ) The user name is -------------------- > coack
The user passwd is -------------------- > $6$fI.oJpm2$IaLUH.vXuJ4yw/xrsTe57b//zlIbP5LgFjGeocJ
会列出有效的用户名和密码串,和其所在的行数。
#!/usr/bin/env python
#-*-coding:utf-8-*-
passfile = open('/etc/shadow','r')
npage = 0
for line in passfile.readlines():
npage += 1
una = line.split(':')[0].strip('') #切片':',第一个为用户名
usp = line.split(':')[1].strip('') #切片':',第二个为密码
if usp == ('*'): #过滤*开头
continue
elif usp == ('!'): #过滤!开头
continue
print '(',npage,')','The user name is','-'*20,'>',una
print 'The user passwd is','-'*20,'>',usp
passfile.close()