Programming with Juliar (Part 2)

November 18, 2015 | Views: 1099

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

“Because people wanted to write another article about this, I’ve decided to do so. The Modules have changed as well as the language itself. Therefore, I believe it will be useful for beginners and people who are interested in this language to read this.”

First thing first. Grab a copy of Juliar Programming language at www.github.com/juliarLang/juliar

Click on “Download ZIP” and the zip file will be downloaded. Extract all files to your favorite location.

If you are Windows user, just run “Juliar Server.exe” and it will launch the application along with the server automatically.

If you are running linux or Mac, do one of the following:

  • Open index.html with your favorite browser ( Note that some of the features will be limited because of browsers’ file security feature)
  • Put the folder into your apache2 www folder and run it from a local server.
  • Upload the files to some  hosting website and open index.html from browser.

If done correctly, you should see a huge logo that welcomes you to *Juliar *
and the interpreter will look like this:

OK, find where it says “Enter *Juliar * command here”

and type the following:

*import encryption *

If done correctly, you should now see a message that says:

Successfully imported module ‘encryption’

Next in the command line, type the following:

*commands *

This will output all the commands! We’re looking for the ones that were imported from the encryption library. It will also display level which is used to determine priority of the module(higher level = higher priority => the higher level commands will be preferred over lower level commands with same name ). Hence, at the time of the writing the priority level for encryption module will be 3(unless we import another library before that).

The commands that popup are decrypt, encrypt, l33tencode, md5, and password 

MD5

Whenever, you call md5 on a string a hash will be generated. For example, if we call

*md5 hello *

This will generate “5d542abc4b2a13b989d1018c511” which is md5 hash 🙂

l33tencode

This is a fun library that will transform English to l33t language. For example, if we call

*l33tencode hello *

One of the answers that can be generated will be  “[=]3|_|_[]” which looks like “hello”

Password

Password will help you generate a random password. For example, if we call

*password  *

It will generate 16 characters in length password i.e. “E6Fpt,-;)6hNNX`F”

In order to generate more or less characters, we can pass in a value such as:

*password  3 *

will generate a 3 character password such as “!xH”

Encrypt & Decrypt

Encrypt and decrypt functions use blowfish crypt (compatible with PHP version) to encrypt and decrypt message. For example if we use the following

*encrypt hello *

This will generate “61C275682626E2A1” coded message. We can then give it to another person, and the message can be decrypted using:

*decrypt 61C275682626E2A1 *

which will output “hello”. We can also use a custom key by passing an argument for example

*encrypt=good hello *

This will generate “EDE78442E5999B81″ coded message. We can give it to another person, and the person will try to decrypt it using:

*decrypt EDE78442E5999B81 *

This will generate “p€I>׎x”. This is not our original message! What happened here? Well we forgot to specify the key, so the default one is used instead. Therefore, we can easily decrypt this if we know that the key is good. Hence,

*decrypt=good EDE78442E5999B81*

will give us the original answer, which is “hello”.

Conclusion: Juliar is a fun language to learn and the security module is constantly updated and is always fun to use!

I hope this article helped you! Please rate this tutorial as 3 🙂 Also, please feel free to contribute to the project by creating your own modules or suggesting a feature.

Share with Friends
FacebookTwitterLinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterLinkedInEmail
Ready to share your knowledge and expertise?
3 Comments
  1. @TAZASPICE

    You can perform security activities using browser, but you must run NGINX or Apache with fmod with Juliar on top.

  2. Can you please explain specifically why this is a fun language?

    For example: Is this a fun language because I can use any of the browsers for performing security activities?

    If yes, what capabilities do we have today and where do we need help with? How can anybody help? If somebody has contributed to python security libraries, how can they help? How can they benefit? I hope I am asking right set of questions.

    Some example questions that I would love to hear more is:
    1. Can I use this for simple pentest activities like nnmap?
    2. Can I use this to import vulnerability scripts?

    Thanks!

  3. Sorry for weird text formatting. When I was creating this article, the article looked different.

Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel