Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/noptrix/sshprank

A fast SSH mass-scanner, login cracker and banner grabber tool using the python-masscan and shodan module.
https://github.com/noptrix/sshprank

Last synced: 22 days ago
JSON representation

A fast SSH mass-scanner, login cracker and banner grabber tool using the python-masscan and shodan module.

Awesome Lists containing this project

README

        

# Description

A fast SSH mass-scanner, login cracker and banner grabber tool using the
python-masscan and shodan module.

# Usage

```
[ hacker@blackarch ~ ]$ sshprank -H
__ __
__________/ /_ ____ _________ _____ / /__
/ ___/ ___/ __ \/ __ \/ ___/ __ `/ __ \/ //_/
(__ |__ ) / / / /_/ / / / /_/ / / / / ,<
/____/____/_/ /_/ .___/_/ \__,_/_/ /_/_/|_|
/_/

--== [ by nullsecurity.net ] ==--

usage

sshprank [opts] |

modes

-h - single host or host list to crack. multiple ports
can be separated by comma, e.g.: 127.0.0.1:22,222,2022
(default port: 22)

-m [-r ] - pass arbitrary masscan opts, portscan given hosts and
crack for logins. found sshd services will be saved to
'sshds.txt' in supported format for '-h' option and
even for '-b'. use '-r' for generating random ipv4
addresses rather than scanning given hosts. these
options are always on: '-sS -oX - --open'.
NOTE: if you intent to use the '--banner' option then
you need to specify '--source-ip ' which
is needed by masscan. better check masscan options!

-s - search ssh servers using shodan and crack logins.
see examples below. note: you need a better API key
than this one i offer in order to search more than 100
(= 1 page) ssh servers. so if you use this one use
'1' for 'page'.

-b - list of hosts to grab sshd banner from
format: [:ports]. multiple ports can be
separated by comma (default port: 22)

options

-r - generate random ipv4 addresses, check for open
sshd port and crack for login (only with -m option!)
-u - single username or user list (default: root)
-p - single password or password list (default: root)
-c - list of user:pass combination
-C - read commands from file (line by line) or execute a
single command on host if login was cracked
-N - do not output ssh command results
-x - num threads for parallel host crack (default: 50)
-S - num threads for parallel service crack (default: 20)
-X - num threads for parallel login crack (default: 5)
-B - num threads for parallel banner grabbing (default: 70)
-T - num sec for auth and connect timeout (default: 5s)
-R - num sec for (banner) read timeout (default: 3s)
-o - write found logins to file. format:
::: (default: owned.txt)
-e - exclude host after first login was found. continue
with other hosts instead
-E - exit sshprank completely after first login was found
-v - verbose mode. show found logins, sshds, etc.
(default: off)

misc

-H - print help
-V - print version information

examples

# crack targets from a given list with user admin, pw-list and 20 host-threads
$ sshprank -h sshds.txt -u admin -P /tmp/passlist.txt -x 20

# first scan then crack from founds ssh services using 'root:admin'
$ sudo sshprank -m '-p22,2022 --rate 5000 --source-ip 192.168.13.37 \
--range 192.168.13.1/24' -p admin

# generate 1k random ipv4 addresses, then port-scan (tcp/22 here) with 1k p/s
# and crack logins using 'root:root' on found sshds
$ sudo sshprank -m '-p22 --rate=1000' -r 1000 -v

# search 50 ssh servers via shodan and crack logins using 'root:root' against
# found sshds
$ sshprank -s 'SSH;1;50'

# grab banners and output to file with format supported for '-h' option
$ sshprank -b hosts.txt > sshds2.txt
```

# Author

noptrix

# Notes

- quick'n'dirty code
- sshprank is already packaged and available for [BlackArch Linux](https://www.blackarch.org/)
- My master-branches are always stable; dev-branches are created for current work.
- All of my public stuff you find are officially announced and published via [nullsecurity.net](https://www.nullsecurity.net).

# License

Check docs/LICENSE.

# Disclaimer
We hereby emphasize, that the hacking related stuff found on
[nullsecurity.net](http://nullsecurity.net/) are only for education purposes.
We are not responsible for any damages. You are responsible for your own
actions.