• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
KaliTut

KaliTut

Kali Linux tutorial and Linux system tips

  • Home
  • Raspberry Pi
  • Privacy Policy
  • About us

How to use cewl in Kali Linux- Custom Word List generator

Last Updated on May 31, 2020 by Kalitut Leave a Comment

In this cewl kali Linux tutorial, we will learn how to use CeWL to generate Custom Word List 

cewl kali linux

The generator can create dictionaries based on the expressions found on the website provided in the parameter. The user can define the depth of search on the site, the minimum number of characters from which the password should be composed. In addition, the application as a crawler / spider  tool can also collect e-mail addresses found on the website.

As befits such applications, it also allows you to define a proxy server or log in using the HTTP Authentication mechanism.

Parameters of the Custom Word List generator program
It seems to us that there is no point in describing all the parameters of the program because we assess the level of required English at the level of the preschooler’s troglodyte. Below is a list of arguments for the Custom Word List generator for the lazy.

[email protected]:~# cewl --help
CeWL 5.1 Robin Wood ([email protected]) (http://digi.ninja)
 
Usage: cewl [OPTION] ... URL
 --help, -h: show help
 --keep, -k: keep the downloaded file
 --depth x, -d x: depth to spider to, default 2
 --min_word_length, -m: minimum word length, default 3
 --offsite, -o: let the spider visit other sites
 --write, -w file: write the output to the file
 --ua, -u user-agent: useragent to send
 --no-words, -n: don't output the wordlist
 --meta, -a include meta data
 --meta_file file: output file for meta data
 --email, -e include email addresses
 --email_file file: output file for email addresses
 --meta-temp-dir directory: the temporary directory used by exiftool when parsing files, default /tmp
 --count, -c: show the count for each word found
 
 Authentication
 --auth_type: digest or basic
 --auth_user: authentication username
 --auth_pass: authentication password
 
 Proxy Support
 --proxy_host: proxy host
 --proxy_port: proxy port, default 8080
 --proxy_username: username for proxy, if required
 --proxy_password: password for proxy, if required
 
 --verbose, -v: verbose
 
 URL: The site to spider.
 
[email protected]:~#

CeWL example

Below is an example of using the CeWL hack program. The program is written in Ruby and already installed in the latest version of Kali Linux 2018 at the moment.

How to use cewl in kali linux
cewl -w log -m 3 -d 1 http://ADDRESS/ 

In the above command, the individual parameters mean:

  • – in log  is a result file with dictionary entries,
  • -m 3  is the minimum length of the word to be added to the dictionary,
  • -d 1  depth of search penetration ( recursive entering URLs found ).

The dictionary generated by the CeWL tool
Below is an example of a generated dictionary. You can further process it with other tools such as  pw-inspector, or a simple proprietary Python script that adds appropriate prefixes or suffixes to words.

What is cewl in kali linux?
Created a personalized dictionary using the Custom Word List generator crawler in Kali Linux.

Cewl on gitHub

Summary about dictionary word generators
As you can see, you do not need to use only the attached default dictionaries with passwords from the  /usr/share/wordlists folder in Kali Linux. Such generators as CeWL, crunch, pw-inspector enable you to personalize passwords for a given penetration test. Most auditors create proprietary password dictionaries for a given safety test.

There is no point in checking the big password vector because your goal is not to break super strong passwords only to determine if your operating system, service or server is secure. 

Filed Under: Penetration Testing Tools Tagged With: CeWL

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Follow us

  • Facebook
  • Twitter
  • YouTube

Categories

  • Android pentesting tools
  • Arduino
  • Books
  • Darknet
  • database
  • General
  • Github Tools
  • Hacking
  • Kali Linux
  • Linux
  • Linux Commands
  • Network Administrator
  • Penetration Testing
  • Penetration Testing Tools
  • PowerShell
  • Raspberry Pi
  • resources
  • Review
  • Termux
  • Tutorials
  • Ubuntu
  • Uncategorized
  • Video Tutorials
  • vmware
  • WiFi Adapter
  • WiFi Pentesting
  • Wireless Router
  • Wireshark

Recent Posts

  • Hijacked Wi-Fi? Thorough explanation of hacking techniques
  • Windows PowerShell tutorial for beginners
  • Learn to Hack Steps from Beginner to Hacker
  • PowerShell Tutorial – GUIDE introduction with basics
  • Top Hacking Tools
  • Home
  • About us
  • Privacy Policy
  • Affiliate disclaimer

Copyright © 2023