Leet Mode in CUPP
Leet mode is the method or technique used to secure the sensitive credentials used for authentication purposes. Leet mode allows users to substitute or replace the characters with similar-looking numerical or special characters. This Substitution makes the confidentiality of credentials stronger than the common credential. For example,
A: 4, @ B: 8, |8 C: ©, ¢ D: |), |}
In the above examples, we have possible numerical and unique character values for Characters A, B, C, D. Leet mode makes the Password or Username values stronger. CUPP tool supports this leet mode. So we can design the wordlists as per the Leet mode instruction given to the characters.
For using this Leet mode in the CUPP tool, we need to change the characters in the cupp.cfg. In the below Screenshot, We have displayed the contents of cupp.cfg file.
You can see that some characters are replaced with numerical values or special characters. So we can change this and give the matter as per our choice. We will use this mode as an example in the “Working with CUPP Tool on Kali Linux” Section.
CUPP – Common User Passwords Profiler
Usernames and Password values are the most commonly used methods for authentication purposes in almost every web application or any type of application. When the credentials provided in this type match the values stored at the server, only the user is authenticated to the specified service. Using weak Usernames and Passwords may lead to various impactful cyber threats like Password Cracking, Brute-Forcing, and Account Takeover. CUPP tool is an automated script written in the python language that interacts with the user and answers some fundamental questions about the victim like Name, Company Name, Partner’s Name, etc. After analyzing these answers, the CUPP tool generates some possible Usernames+Password words that attackers can use for various attacks like Password Cracking and Brute-Forcing.
Note: Make Sure You have Python Installed on your System, as this is a python-based tool. Click to Install: Python Installation Steps on Linux