https://github.com/fluepke/ssh-scanner
A fast scanner to try SSH credentials against millions of hosts
https://github.com/fluepke/ssh-scanner
Last synced: 7 months ago
JSON representation
A fast scanner to try SSH credentials against millions of hosts
- Host: GitHub
- URL: https://github.com/fluepke/ssh-scanner
- Owner: Fluepke
- Created: 2021-09-24T10:08:16.000Z (about 4 years ago)
- Default Branch: main
- Last Pushed: 2023-01-06T14:00:59.000Z (over 2 years ago)
- Last Synced: 2025-02-02T01:33:33.313Z (8 months ago)
- Language: Go
- Size: 4.88 KB
- Stars: 6
- Watchers: 3
- Forks: 3
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# ssh-scanner
Some (hacky) fast SSH-Scanner to try some credential at ✨ webscale ✨ against a lot (or maybe even all IPv4) SSH servers.## Usage
As a preparation [`masscan`](https://github.com/robertdavidgraham/masscan) the target network for open SSH servers, write a text file, one target IP per line.```
Usage of ./ssh-scanner:
-cpuprofile string
write cpu profile to file
-input string
Text file with ip addresses (default "in.txt")
-logfile string
Logfile (default "log.jsonl")
-p int
Parallelism, must be smaller than: net.ipv4.ip_local_port_range (second value - first value) (default 40000)
-pass string
SSH password
-src string
Comma separated list of source IP addresses to use
-user string
SSH user
```## Considerations
* Tuning TCP kernel parameters yields better, faster results
* You'll get a bunch of abuse complaints, much more than from a `masscan` -> talk to you ISP or be your ISP
* Code quality could be improved, this was a quick hack to determine impact of some hardcoded credentials in some internet of shit device
* More features could be added, e.g. writing results to an Elasticsearch or database
* `-p` means parallelism and not 'port', I am sorry and noticed only while writing this README :p