Thursday, May 07, 2020

Sshprank - A Fast SSH Mass-Scanner, Login Cracker And Banner Grabber Tool Using The Python-Masscan Module


A fast SSH mass-scanner, login cracker and banner grabber tool using the python-masscan module.

Usage
[ hacker@blackarch ~ ]$ sshprank -H
--==[ sshprank by nullsecurity.net ]==--

usage

sshprank <mode> [opts] | <misc>

modes

-h <host:[ports]> - single host to crack. multiple ports can be seperated
by comma, e.g.: 22,2022,22222 (default port: 22)

-l <file> - list of hosts to crack. format: <host>[:ports]. multiple
ports can be seperated by comma (default port: 22)

-m <opts> [-r <num>] - pass arbitrary masscan opts, portscan given hosts and
crack for logins. found sshd services will be saved to
'sshds.txt' in supported format for '-l' option and
even for '-b'. use '-r' for generating random ipv4
addresses rather than scanning given hosts. these
options are always on: '-sS -oX - --open'.
NOTE: if you intent to use the '--banner' option then
you need to specify '--source-ip <some_ipaddr>' which
is needed by masscan.

-b <file> - list of hosts to grab sshd banner from
format: <host>[:ports]. multiple ports can be
seperated by comma (default port: 22)

options

-r <num> - generate <num> random ipv4 addresses, check for open
sshd port and crack for login (only with -m option!)
-c <cmd> - execute this <cmd> on host if login was cracked
-u <user> - single username (default: root)
-U <file> - list of usernames
-p - single password (default: root)
-P <file> - list of passwords
-C <file> - list of user:pass combination
-x <num> - num threads for parallel host crack (default: 20)
-s <num> - num threads for parallel service crack (default: 10)
-X <num> - num threads for parallel login crack (default: 20)
-B <num> - num threads for parallel banner grabbing (default: 50)
-T <sec> - num sec for connect timeout (default: 2s)
-R <sec> - num sec for (banner) read timeout (default: 2s)
-o <file> - write found logins to file. format:
<host>:<port>:<user>:<pass> (default: owned.txt)
-e - exit after first login was found. continue with other
hosts instead (default: off)
-v - verbose mode. show found logins, sshds, etc.
(default: off)

misc

-H - print help
-V - print version information

examples

# crack targets from a given list with user admin, pw-list and 20 host-threads
$ ./sshprank -l sshds.txt -u admin -P /tmp/passlist.txt -x 20

# first scan then crack from founds ssh services
$ sudo ./sshprank -m '-p22,2022 --rate=5000 --source-ip 192.168.13.37 \
--range 192.168.13.1/24'

# generate 1k random ipv4 addresses, then port-scan (tcp/22 here) with 1k p/s
# and crack login 'root:root' on found sshds
$ sudo ./sshprank -m '-p22 --rate=1000' - r 1000 -v

# grab banners and output to file with format supported for '-l' option
$ ./sshprank -b hosts.txt > sshds2.txt

Author
noptrix

Notes
  • quick'n'dirty code
  • sshprank is already packaged and available for BlackArch Linux
  • My master-branches are always stable; dev-branches are created for current work.
  • All of my public stuff you find are officially announced and published via nullsecurity.net.

Disclaimer
We hereby emphasize, that the hacking related stuff found on nullsecurity.net are only for education purposes. We are not responsible for any damages. You are responsible for your own actions.




via KitPloitMore info
  1. Hacking Linkedin
  2. Hacking Food
  3. Tipos De Hacker
  4. Codigo Hacker
  5. Hacking Net
  6. Hacking Growth
  7. Geekprank Hacking
  8. Curso Growth Hacking
  9. Live Hacking
  10. Hacking Ético Con Herramientas Python Pdf
  11. Como Convertirse En Hacker
  12. Hacking Forums
  13. Hacking Con Buscadores Pdf
  14. Reddit Hacking

No comments: