Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.
▄████████ ▄██████▄ ▄▄▄▄███▄▄▄▄ ▄███████▄ ▄███████▄
███ ██ ███ ███ ▄██▀▀▀███▀▀▀██▄ ███ ███ ███ ███
███ █▀ ██ ███ ███ ███ ██ ███ ███ ██ ███
███ ███ ███ ███ ███ ███ ███ ███ ███ ███
███ ███ ██ ███ ███ ███ ▀█████████▀ ▀█████████▀
██ █▄ ███ ███ ███ ███ ███ ███ ███
███ ███ ███ ███ ███ ██ ███ ██ ██
███████▀ ▀██████▀ ▀█ ███ █▀ ▄████▀ ▄████▀ :)
Version : 1.0.5
usage: compp [-h] [-p PERMUTATIONS] [-c CONFIG] [-l] [-n] [-o OUTPUT] [-v] [input_file]
Company Passwords Profiler (ComPP)
positional arguments:
input_file company.json input file
optional arguments:
-h, --help show this help message and exit
-p PERMUTATIONS, --permutations PERMUTATIONS
Number of permutations
-c CONFIG, --config CONFIG
Configuration file
-l, --leet Add 1337 passwords transformation
-n, --numbers Add numbers to password
-o OUTPUT, --output OUTPUT
Directs the output to a file of your choice
-v, --version Show the version of this program
The tool responds to a need to generate wordlists quickly with few inputs. The generated passwords will contain generic company informations with transformation such as APPNAME2019!
or Company75000$
.
The main use of the generated wordlist is with remote bruteforce and password spraying attack such as a ssh service or a WordPress website.
This tool aims to replace CeWL because web scrapping is not be the most efficient way to generate a wordlist.
Note: If you have time to perform OSINT research against the targeted users, you may use tools such as CUPP or BEWGor to complete your wordlist.
On BlackArch :
sudo pacman -Syu compp
With PIP from PyPI packages :
pip install ComPP
With python from GitHub repository :
git clone git@github.com:sec-it/ComPP.git
cd ComPP
python setup.py install
User inputs can either be filled in the interactive prompt or through a json file. If an input is unknown to the user, it suffices to leave the field empty in order to go to the next field. Here is the full program prompt:
$ compp
▄████████ ▄██████▄ ▄▄▄▄███▄▄▄▄ ▄███████▄ ▄███████▄
███ ██ ███ ███ ▄██▀▀▀███▀▀▀██▄ ███ ███ ███ ███
███ █▀ ██ ███ ███ ███ ██ ███ ███ ██ ███
███ ███ ███ ███ ███ ███ ███ ███ ███ ███
███ ███ ██ ███ ███ ███ ▀█████████▀ ▀█████████▀
██ █▄ ███ ███ ███ ███ ███ ███ ███
███ ███ ███ ███ ███ ██ ███ ██ ██
███████▀ ▀██████▀ ▀█ ███ █▀ ▄████▀ ▄████▀ :)
Version : 1.0.5
Fill the differents inputs (case insensitive). Leave blank for unknow fields.
[+] Enter company/application names (comma separated): Company,Comp
[+] Enter company zip codes (comma separated): 75,75000
[+] Enter company cities names (comma separated): Paris
[+] Useful keywords (comma separated): Appname
Or
$ compp example.json
Output size may vary with the provided options. Here is a preview of what you can expect with the default options:
75#Appname
75000%company
Appname1995?
appname$
appname1995+
CompParis2000
Company75000!
COMPANYAPPNAME2019#
PARISCOMP!
ParisCompany2021_
Paris75000@
...
- First, the tool compute case transformation for each fields (lowercase, UPPERCASE and Capitalize). The originals set of fields and the 3 generated sets are added to the wordlist.
- Then, the tool apply itertools.combination() on each set with a default size up to 2. The use of such combination avoid having the same word twice in the same password. The generated combinations are added to the wordlist
- The tool add a range of years to the previously generated wordlist. The original wordlist is also kept.
- The tool add a range of special chars to the previously generated wordlist. The original wordlist is also kept.
- (Optional) The tool add a range of numbers to the previously generated wordlist. The original wordlist is also kept.
- (Optional) The tool add a l33t transformation to the previously generated wordlist. The original wordlist is also kept.
Made by Alex G. (@zeecka_), pentester at SEC-IT.