Hm..., if I would try to write a naive hacker-tool, I would take a long list of valid and invalid usernames/passwords and try to automate the whole procedure like
Maybe you can provide us with some more background information on what you
attempt to do and what you have done so far?
It is likely that a solution to your problem already exists, but knowing
the bigger picture would help to give proper and better advice.
E.g., what concrete command line utility do you intend to use? Are there special
keywords to look after? What to do after successful login? Remote or local application? etc.
Although I assume your intentions are legitimate, there were less subtle cases where helping would do no good, so please forgive me my initial suspicion - especially since this is your first post.
In reply to Re: Automating command line utility
by Perlbotics
in thread Automating command line utility
by satyakm
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |