Bull's Eye Wordlist Generator - Does your password rely on predictable patterns of accessible info?
Python
Switch branches/tags
Nothing to show
Clone or download
Latest commit 090dd62 Feb 9, 2018
Permalink
Failed to load latest commit information.
BEWGor.py Update BEWGor.py Jun 29, 2017
Changelog.md Typos, Formatting Feb 9, 2018
Contributing.md Typo Aug 7, 2017
LICENSE.txt Alpha Release May 27, 2017
README.md Typos, Formatting Feb 9, 2018
Sample_Output.txt Typos, Formatting Feb 9, 2018
bewgor_nose.png Alpha Release May 27, 2017

README.md

BEWGor - Bull's Eye Wordlist Generator

Pick your knows!

Does your password rely on predictable patterns of accessible info?

Inspired by and based on Mebus' CUPP

Alpha Version - Released 27 May 2017


![Pick Your Knows!](bewgor_nose.png)

Alpha version is "Flat"

This means all associates are treated equally, and BEWGor only queries basic information about them

How do I use BEWGor?

Clone it or download the zip file. Run it with Python 2.

BEWGor will not run with Python 3

python BEWGor.py - runs normally

python BEWGor.py -help - presents a help screen that admittedly doesn’t say much, yet.

python BEWGor.py -input also runs normally. More modes are in development.

What Does BEWGor Do?

BEWGor is designed help with ensuring password security. It is a Python script that prompts the user for biographical data about a person, referred to as the Subject. This data is then used to create likely passwords for that Subject.

All information is manually inputted and stored locally. No information is sent to any other location, or pulled from the web.

If you want to improve your password security, run BEWGor on yourself!

To see an example, check out the Sample-Output File - 1.6 Million Lines

What Are “Likely” Passwords For a Given Subject?

When it comes to generating passwords, humanity, on average, has not demonstrated too much creativity. The most common password is 123456 and the 2nd most common is password. My first project, Probable-Wordlists explores this in depth. It contains billions of the world’s most common passwords, presented in order of how common they are.

If a person doesn’t use a single-word password straight out of a dictionary, they are likely to use words from their personal lives. These words are easy to remember and not screamingly obvious to others - and for many, those are good enough reasons to use them as passwords…

Does your password sound like the answer to a security question?

Passwords often include information like:

  • Mother’s Maiden Name
  • Name of a Childhood Pet
  • Birthdays of the password holder or a loved one
  • The password holder’s nationality

Due to Social Media use and the strength of modern day Open-Source Intelligence (OSINT), this information is NOT HARD TO COME BY. Therefore, including it in your password is NOT SECURE.

BEWGor asks for information about a person, and those they associate with, and generates potential passwords based on that data.

Did your subject have a dog named Spot?
Was your subject born in 1980?

BEWGor will come up with many variations of these two pieces of information:

spot1980, 1980spot, SPOT80, 80Spot and more.

If BEWGor is based on CUPP, How Are They Different?

BEWGor takes the simplest features of CUPP and does a very deep dive. It prompts the user for a lot more specific information, but not have all of CUPP's capabilities.

What Does BEWGor Do That CUPP Doesn’t?

  • Vastly Increased Information Detail on Main Subject
  • Includes Support for an arbitrary number of family members and pets
  • By using permutations to generate possible passwords, BEWGor can generate huge numbers of passwords
  • Create Upper/Lower/Reverse variations of inputted values
  • Save raw inputted values to a Terms file before variations are generated
  • Set upper and lower limits on output line length
  • Check that an inputted Birthday is valid. Birthdays must not be the future, a false leap day, June 32nd, etc.

What Does CUPP Do That BEWGor Doesn’t?

  • Allow the User to download Wordlists from within the program itself.
  • Create "l33t" variations of given lines
  • Allow the user to add special characters at the end of words without entering them specifically
  • Limit the number of outputs to the most likely formats, such as Name+birthyear

BEWGor Has Answers To (Most Of) These Functionalities

  1. I’ve got you covered on wordlists - check out my other project Probable-Wordlists
  2. "l33t" variations might be included in a future release, but for now, using a program like HashCat will allow you to create l33t-style and other variations of a BEWGOr wordlist as-needed
  3. HashCat can do this as well with the ‘rule’ function
  4. BEWGor is not subtle, it will generate ALL the combinations - including plenty of unlikely ones.

This may be slimmed down in the future, but why not err on the side of having all the possibilities?

Areas With Room For Improvement

  • Heavy Handed! Big files, intensive (produces a lot of unlikely variations)
  • Doesn’t handle non-ASCII well
  • Doesn’t handle names that include spaces well, such as von Braun
  • Biased towards monogamous behavior. Doesn’t ask about past significant others, or multiple current significant others
  • Treats Pets the same way it treats Children, Siblings and Significant others
  • Doesn’t include user-defined associates (mentor, protogé, any relationship I didn’t think of yet.)
  • Has mixed feelings about the word "of"

What Information Does BEWGor Request?

In Alpha release, associates are limited to:

  • 1 Significant other,
  • Any number of Children, Parents, Siblings and Pets.
Both Main Subject and Associates:
  • Full Name
  • Maiden Name
  • Nicknames/Usernames
  • Birthday (day and month)
  • Birth Year
  • From this information, it can generate initials, Greek/Chinese Zodiac Sign and Birthstone (Western and Hindu Style)
Main Subject:
  • Everything in the above category
  • Gender Identity
  • Nationality
  • National Demonym (Such as Briton, or British)
  • National Day
  • Ethnicity
  • Birthplace
  • Hometown
Additional:
  • Full Dates (input the day the subject founded their company, anniversary, etc.)
  • Days
  • Years
  • Words
  • Numbers
  • Range of Years (if you don’t know subject’s exact age)

Future Developments

Future versions will query far more detail about the Main Subject, such as:
  • National Motto, Monarch’s Name
  • Local Demonym (Londoner, Parisian, Texan)
  • Addresses, Phone Numbers, contact information
  • Career
  • Academic History
  • Favorite things
  • Clubs and other associations
  • and more...

Relationship-specific Prompts/Classes like:

  • S/O - Meeting place, anniversary, wedding location...
  • Pets - breed, age, multiple pets

Ability to Save/Load Inputted Values to a 'Terms' File

This file can be edited outside of the script but can be fed into BEWGor directly. No prompting required.

Ability to Select Operational Modes With Input Arguments

  • Minimum Data Prompts (Don’t ask for optional prompts, one entry per prompt)
  • Maximum Data Prompts (Assume all prompts and variations included)
  • Maybe more

Want to Contribute?

See the Contributing.md file for guidelines

Disclaimer and License

  • BEWGor is for LAWFUL, ETHICAL AND EDUCATIONAL PURPOSES ONLY.
  • The files contained in this repository are released "as is" without warranty, support, or guarantee of effectiveness.
  • However, I am open to hearing about any issues found within these files and will be actively maintaining this repository for the foreseeable future. If you find anything noteworthy, let me know and I'll see what I can do about it.

The author's intent for this project is to provide information on insecure passwords in order to increase overall password security. This script creates passwords based on common patterns to demonstrate what you should avoid when creating new passwords. It does not scrape any information from the web, nor upload or transmit the results - it merely saves permutations of manually inputted data into a local file.

BEWGor uses the GNU GPL v3

BEWGor uses the GNU GPL v3 License. Terms can be found in the license file

or by clicking the GNU GPL v3 button above this line.