|
|
|
@ -1,12 +1,16 @@ |
|
|
|
|
# [How to Brute-Force SSH Servers in Python](https://www.thepythoncode.com/article/brute-force-ssh-servers-using-paramiko-in-python) |
|
|
|
|
To run this: |
|
|
|
|
- `pip3 install -r requirements.txt` |
|
|
|
|
- |
|
|
|
|
|
|
|
|
|
## INSTALLATION |
|
|
|
|
|
|
|
|
|
```bash |
|
|
|
|
pip3 install -r requirements.txt |
|
|
|
|
``` |
|
|
|
|
- Help: |
|
|
|
|
```bash |
|
|
|
|
python bruteforce_ssh.py --help |
|
|
|
|
``` |
|
|
|
|
**Outputs:** |
|
|
|
|
``` |
|
|
|
|
**Output:** |
|
|
|
|
```bash |
|
|
|
|
usage: bruteforce_ssh.py [-h] [-P PASSLIST] [-u USER] host |
|
|
|
|
|
|
|
|
|
SSH Bruteforce Python script. |
|
|
|
@ -20,7 +24,14 @@ To run this: |
|
|
|
|
File that contain password list in each line. |
|
|
|
|
-u USER, --user USER Host username. |
|
|
|
|
``` |
|
|
|
|
- If you want to bruteforce against the server `192.168.1.101` for example, the user `root` and a password list of `wordlist.txt`: |
|
|
|
|
``` |
|
|
|
|
|
|
|
|
|
## UTILISATION |
|
|
|
|
|
|
|
|
|
If you want to bruteforce against the server `192.168.1.101` for example, the user `root` and a password list of `wordlist.txt`: |
|
|
|
|
```bash |
|
|
|
|
python bruteforce_ssh.py 192.168.1.101 -u root -P wordlist.txt |
|
|
|
|
``` |
|
|
|
|
|
|
|
|
|
## UPDATE |
|
|
|
|
|
|
|
|
|
- [x] 09/11/22: add "allow_agent=False,look_for_keys=False" to client.connect() args to avoid "Quota exceeded, retrying with delay..." error. |