Victim application in penetration test of password list attack for my understanding by using Mezzanine like "Wordpress" http://mezzanine.jupo.org/docs/
- python3
- pip3
- git
- basic usage
- modify "account_list.csv" file
(victim-app) kazu0716 MacBook-Pro-4 $ head -n 10 account_list.csv
richard59,[email protected],@2~OMZ025
melindajones,[email protected],k9N?OPj76*fO
scottaguirre,[email protected],4w7^1}43HNJ
fschmidt,[email protected],i%@9j~AJA^ja=O7
jamesvictor,[email protected],/p2].HI|zU
fyoung,[email protected],"S,J|$<s7hE"
danielrodriguez,[email protected],"F7,8uM8o3_Rl~6)"
juan28,[email protected],DIj<5kK$W
cookdestiny,[email protected],}Qz26=$wA~
vsilva,[email protected],z1^@G|MVH0m@Y
-
admin page(CMS)
-
Other pages
git clone https://github.com/kazu0716/mezzanine-test.git
cd mezzanine-test/
pip3 install -r requirement.txt
python3 manage.py createdb
python manage.py runscript create_users
python3 manage.py runserver