SSH Brute Force Tool - Testers needed 12-02-2014, 06:29 PM
#1
Hi everybody,
The past 2 days I've been busy creating a python SSH Brute Force testing tool and I need some experienced Linux users to test it.
Self I'm to limited with machines I'm allowed to test on. I hope to find some 'White Hat' testers over here who have more target machines they can use.
Below I'll copy the introduction text from bitbucket. If you read it and don't know what the hell it all means, don't go any further. Don't start testing it.
You can find the files on github : https://github.com/Cleveridge/cleveridge-ssh-scanner/
The past 2 days I've been busy creating a python SSH Brute Force testing tool and I need some experienced Linux users to test it.
Self I'm to limited with machines I'm allowed to test on. I hope to find some 'White Hat' testers over here who have more target machines they can use.
Below I'll copy the introduction text from bitbucket. If you read it and don't know what the hell it all means, don't go any further. Don't start testing it.
Code:
************************************************
|| CLEVERIDGE SSH SCANNER ||
************************************************
|| IMPORTANT: ||
|| This tool is for ethical testing purpose ||
|| only. ||
|| Cleveridge and its owners can't be held ||
|| responsible for misuse by users. ||
|| Users have to act as permitted by local ||
|| law rules. ||
************************************************
|| Cleveridge - Ethical Hacking Lab ||
|| cleveridge.org ||
************************************************
What is the Cleveridge SSH Scanner
**********************************
The Cleveridge SSH Scanner is a SSH Brute Force tool written in python.
The tool tries to get access to machines (IPv4) on the SSH port (22).
When the machines is accesable on port 22, the tool brute forces the ssh login with the most common default user names and passwords.
The tool offers you the options to attack
- one IP
- a range of IP's (e.g. 192.168.0.1-25)
- IP's listed in a file
!!! The tool works only in combination with Tor, Proxychains and Python !!!
Tested
******
At this moment the Cleveridge SSH Scanner is only tested in a Linux Kali environment with Python 2.7, Proxychains (http://proxychains.sourceforge.net/) and Tor (https://www.torproject.org/) installed.
How to use in Linux
*******************
1. Be sure you have tor and proxychains installed.
if you have problems installing these programs there is enough documentation available online.
2. Edit your proxychains configuration file:
Most of the time you will find this file at /etc/proxychains.conf
What to change...
1st : uncomment 'dynamic_chain' (remove the # in front of it)
2nd : comment 'strict_chain' and 'ramdom chain' (add a # in front of it)
3th : Below [ProxyList], add your Tor Listener settings, this could be
socks4 127.0.0.1 9050
More info : http://www.shellhacks.com/en/Anonymous-Port-Scanning-Nmap-Tor-ProxyChains
3. Download the Cleveridge SSH Scanner files into a directory of your choise and chmod it so you are allowed to execute it.
4. Edit the 'cl_ssh_scan.py' file. On +/- line 27 change my_ip into your own real IP.
5. In Terminal, go to the Cleveridge SSH Scanner directory and execute:
proxychains ./cl_ssh_scan.py
You can find the files on github : https://github.com/Cleveridge/cleveridge-ssh-scanner/
redN00ws
Cleveridge - Ethical Hacking Lab
I'm looking for freelance vulnerability testers. Interested? Contact me...
Cleveridge - Ethical Hacking Lab
I'm looking for freelance vulnerability testers. Interested? Contact me...