Comprehensive Guide On Cupp - A Wordlist Generating Tool
Comprehensive Guide On Cupp - A Wordlist Generating Tool
Comprehensive Guide On Cupp - A Wordlist Generating Tool
Table of Content
Introduction to Cupp
How Cupp Works
Getting Started
Generating Custom Dictionary
Adding to Custom Dictionary
Downloading Dictionaries from Cupp Repository
Downloading Default Usernames and Passwords
Quiet Mode
Introduction to Cupp
Cupp stands for Common User Passwords Profiler and this tool
can be used in many circumstances like license penetration
tests or forensic crime investigations, CUPP is a cross-platform
and written in Python and it’s functioning is simple but with
very powerful results. This application is a social engineer’s
best friend when it comes to creating targeted password
dictionaries which are tailored to an individual.
Optional Arguments:
1 ./cupp.py –a
2 ls
3 cat alectodb-passwords.txt
Quiet Mode
Quiet mode is for running Cupp in a more hush-hush way. If
you’re the kind of person who does not want a big banner on
their screen showing everyone what you’re doing, you’ll like
this option. This basically makes for a cleaner screen while
cupp is carrying out the commands you’re giving it, without the
funny cow popping up on top.
We’re going the couple the quiet mode option with the
dictionary download option that we demonstrated above.
1 ./cupp.py -a -q
Share this:
Like this:
Like
RAJ CHANDEL
Raj Chandel is a Skilled and Passionate IT Professional especially in IT-Hacking
Industry. At present other than his name he can also be called as An Ethical
Hacker, A Cyber Security Expert, A Penetration Tester. With years of quality
Experience in IT and software industry
PREVIOUS POST
← MERCY: VULNHUB WALKTHROUGH
NEXT POST
COMPREHENSIVE GUIDE ON PYDICTOR – A WORDLIST
GENERATING TOOL →
Leave a Reply
Your email address will not be published. Required elds are marked *
Comment
Name *
Email *
Website
POST COMMENT
Search
ENTER KEYWORD
Subscribe to
Blog via Email
Email Address
SUBSCRIBE
Follow me on
Twitter
Hacking Articles
Retweeted
10h
Categories
BackTrack 5 Tutorials
Cryptography &
Stegnography
CTF Challenges
Cyber Forensics
Database Hacking
Footprinting
Hacking Tools
Kali Linux
Nmap
Others
Penetration Testing
Privilege Escalation
Red Teaming
Social Engineering
Toolkit
Trojans & Backdoors
Website Hacking
Window Password
Hacking
Wireless Hacking
Articles
Select Month