this post was submitted on 17 Feb 2024
9 points (90.9% liked)

Cybersecurity

5283 readers
125 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 1 year ago
MODERATORS
 

Im looking to create a real looking .cvs or .json file as if it was exported from a password manager.

  • E-Mail should always be the same and of my choice. Username should not be weird/random letters.
  • Websites should be real, random standard websites like facebook, twitter, instagram etc. no weird stuff.
  • bonus if it has credit cards or notes like "bitcoin wallet".

I found mockaroo, but the stuff it generates is too random. Any other tools that are suitable for this and can be used by a noob?

Many thanks!

top 12 comments
sorted by: hot top controversial new old
[–] [email protected] 5 points 6 months ago (1 children)

This sort of thing is trivial to do with Python. If you have to do stuff like this often, it's definitely worth investing a few hours into learning it.

[–] [email protected] 4 points 6 months ago* (last edited 6 months ago)

It's not really important, more like a joke born out of boredom. But now if someone finds my veracrypt usb and manages to crack the first password, they will be trolled a bit and can read this beautiful diary entry (which GPT wrote)

Dear diary, let me tell you, nobody knows cyber security like I do. It's true. We've got the best, the most tremendous cyber security in the world. It's not even close. Our encryption? It's so strong, so powerful, even the smartest hackers—very smart people, by the way—they can't crack it. They try and they try, but they just can't do it. It's like trying to break into Fort Knox, but even tougher. Believe me. And DDoS attacks? Please. They're like little mosquitoes to us. We swat them away without even breaking a sweat. Our firewalls are like this massive, beautiful wall, and I know something about building walls. They're the biggest, the best. Nothing gets through. Nothing. And phishing? We spot those a mile away. Our people are so alert, so vigilant, it's like they have a sixth sense for these things. Our antivirus software? It's like the superhero of software. It's so advanced, so ahead of its time, that viruses give up. They see our defenses and say, "Nope, not going there. Too tough." It's incredible, really. So when I say we have the best cyber security, I'm not exaggerating. It's not just good, it's the best. It's fantastic, folks. Absolutely fantastic.

😅

[–] [email protected] 4 points 6 months ago

I'm a rubyist so I'd use ruby + faker, but there's a port of faker for just about any language...

[–] [email protected] 4 points 6 months ago

This would be pretty easy to script with a fake data generator like mimesis, that can use existing providers, choose random options from a given set, and allows the creation of custom providers (e.g. pick a random website from a file of valid websites that you would like it to use)

[–] [email protected] 4 points 6 months ago (1 children)

Export a real one then modify it

[–] [email protected] 2 points 6 months ago* (last edited 6 months ago)

ya peobaby faster than figuring out how to automate it 😅

[–] [email protected] 2 points 6 months ago

I would suggest to write a Python script together with https://pypi.org/project/Faker/ - might not be the noob-friendliest, but also not too hard to do

[–] [email protected] 2 points 6 months ago* (last edited 6 months ago)

Sounds like a pretty niche task. Probably easiest to write a python or bash script to do it, maybe you could start with a real export and remove all the passwords, then add newly generated ones with a simple regex find and replace.

[–] [email protected] 2 points 6 months ago

Export a real one then modify it

[–] [email protected] 2 points 6 months ago (1 children)

I would not recommend using a real one and modifying it. As it creates creates a list of sites that can be targeted for other forms of entry. Like social engineering and recovery methods.

[–] [email protected] 1 points 6 months ago (1 children)

i made a real one with lastpass and exported them, but none of the accounts exist and i dont use any of the sites.

[–] [email protected] 2 points 6 months ago

ah that makes more sense