Well, I'm not very good with Perl, as I have just started, but I was wondering if anybody could lead me to a good page on where to start. My first program, I want to make a simple perl script that tries various usernames and passwords. If it get's redirected to a another webpage that I do not wish to view, it shows as "invalid" and if it shows a webpage that is "valid", I would want it to keep all this in a log file. Now what are the modules that would be used for this?
3 1188 prn 254
Recognized Expert Contributor
Well, I'm not very good with Perl, as I have just started, but I was wondering if anybody could lead me to a good page on where to start. My first program, I want to make a simple perl script that tries various usernames and passwords. If it get's redirected to a another webpage that I do not wish to view, it shows as "invalid" and if it shows a webpage that is "valid", I would want it to keep all this in a log file. Now what are the modules that would be used for this?
Hi Shing,
Let me get this straight. I hope this is just a language problem, but it looks like you want to try hacking someone else's site by running a script to try out lots of username/password combinations and log the ones that are valid for future reference. Is that what you are talking about? I don't think you can expect to get any help here if it is.
I apologize if I got that wrong and in that case you might want to explain your problem more clearly.
Regards,
Paul
It is purely for internal trials only. I could always MD5 hash my server passwords...but that would be a pain.
Even if you think I'm doing something illegal, you could always just lead me off on the course i wish to go...u know, some guidance. Kind of like how Dumbledore tells Harry not to take the dark path, but shows him the type of magic he can aquire.
prn 254
Recognized Expert Contributor
It is purely for internal trials only. I could always MD5 hash my server passwords...but that would be a pain.
Even if you think I'm doing something illegal, you could always just lead me off on the course i wish to go...u know, some guidance. Kind of like how Dumbledore tells Harry not to take the dark path, but shows him the type of magic he can aquire.
Hi Shing,
I'll take you at your word for this. I will say that if you are planning to log passwords (internal or otherwise) then some kind of encryption for the result would be a very good idea. Storing plaintext passwords anywhere is definitely not something I can ever recommend.
Beyond that, I'll just point you to a couple of resources. You should check out the LWP family of modules, which are what you want for interacting with web pages programmatically. LWP::Simple may be too simple for what you want, but that's OK. I have found Lincoln Stein's book Network programming with Perl to be useful. I seem to recall that there is at least one newer book on similar topics, but I don't recall its name.
HTH,
Paul
Sign in to post your reply or Sign up for a free account.
Similar topics |
by: Florent |
last post by:
Hi,
I run a few sites and I want to log in my main site database when/if there
is a problem, (like a page not found or an unknown agent).
But I don't want to give direct access to my database...
|
by: Tony Pino |
last post by:
Hi,
Lets say there's a web site with simple authentication. It
asks you to type a uname/password into a couple text
boxes, and then it gives you a cookie and you're logged in
for 20 minutes or...
|
by: Mike |
last post by:
I am relatively new to Web development and I have a pretty simple
question. How do I get the web site identification information (from
IIS) inside my aspx.cs? Spacifically I want the web pages...
|
by: Mantorok |
last post by:
Hi all
Is there anyway of locating the root folder for your current web-site, ie if
I have a site running on http://intranet/applicationname, is there anywhere
in .Net that contains that info?
...
|
by: Stu |
last post by:
Hi,
I need to post log in details from one web site to another to log the user
in to one of two sites. The user will enter a username and password in to
textboxes on site 'A', and depending on...
| |
by: Blasting Cap |
last post by:
I have to change the front page for a sales system I work on, and want
to use some thumbnails of wallpaper that is on a sister site.
The wallpapers are jpegs, and are 640, 800, 1024 & 1280 in...
|
by: Gregory A Greenman |
last post by:
I'm trying to screen scrape a site that requires a password. If I
access the site's login page in my browser and view the source, I
see that it does not contain a viewstate.
When my program...
|
by: Steve |
last post by:
I'm looking for feedback on an authentication solution we are
considering for an ASP.NET 2.0 project.
The site will be accessed by both internal users who are logged into
the Windows domain, and...
|
by: ThunderMusic |
last post by:
Hi,
Ok, I find myself having a lot of troubles with URL Rewriting and I've seen
on the net that in some situations, indexers have difficulty indexing sites
because of some flaws in the url...
|
by: Gustaf |
last post by:
I'm part of an organization with activities in Sweden, Norway and Denmark. Some activities are local to each country, while others are common. Now we want a website to inform the members and public....
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
| |
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and...
| |
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated ...
|
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence...
| |