Eleven Years of Service
Posts: 655
Threads: 15
RE: Against.py Best SSH Bruteforcer 03-03-2014, 06:05 AM
#2
tbh, install a PAM logger backdoor on your own system and log failed SSH attempts, then try to SSH into the attackers' boxes with the same password. Quite a few lame worms are going around that try to guess bad SSH passes.
PGP
Sign: F202 79C9 76F7 40BB 54EC 494F 5DEF 1D70 14C1 C4CC
Encrypt: A5B3 1B21 55E1 80AF 4C6E DE83 467B 8EFC 3DEE 681C
Auth: CD55 E8A5 1A08 2933 8BA6 BC88 D81F 1943 739A 3C47
•
Twelve Years of Service
Posts: 494
Threads: 47
RE: Against.py Best SSH Bruteforcer 03-03-2014, 05:08 PM
#3
I would like to say that this script is a bad idea in almost every sense. Wherever there should have been multi-processing, there is multi-threading, not that either can bypass the global thread lock anyway. Additionally, using an interpreted language for brute forcing is like using a recursive method when an iterative one will do. That is to say, it's largely more expensive and slower. As if that wasn't enough, the script is terrible optimized and is not multi-platform.
Why yes, I am mad, why do you ask?
•
Twelve Years of Service
Posts: 1,244
Threads: 7
RE: Against.py Best SSH Bruteforcer 03-03-2014, 06:06 PM
#4
You really should look up the difference between the python modules for threading and multiprocessing, the latter does indeed bypass the GIL.
As for your worries about using an IL, the bottleneck for any networked bruteforce will always be network bandwidth, not processing speed of the sender. The only valid concern would be the increased memory footprint on the client.
•
Eleven Years of Service
Posts: 2,190
Threads: 261
RE: Against.py Best SSH Bruteforcer 03-05-2014, 08:27 AM
#6
It's made for a different version of Python, this is a bitch to me since I have to take time to convert it to my version's syntax.
Ex:
print 'fuck you'
and
print('fuck you')
Also, I'm with 3ss. This isn't the best.
•