diff --git a/README.md b/README.md index c9b01ce..ebb2d3d 100644 --- a/README.md +++ b/README.md @@ -1,32 +1,12 @@ # [How to Brute-Force SSH Servers in Python](https://www.thepythoncode.com/article/brute-force-ssh-servers-using-paramiko-in-python) -This project aims to demonstrate botted SSH brute force hacking with a Python script. -It is used with a dictionnary (wordlist.txt). +Ce projet (à titre pédagogique) montre l'utilisation d'un script python permettant de faire une attaque par brute force au dictionnaire (wordlist.txt). ## INSTALLATION ```bash -pip3 install -r requirements.txt +python3 -m pip install -r requirements.txt ``` -- Help: - ```bash - python bruteforce_ssh.py --help - ``` - **Output:** - ```bash - usage: bruteforce_ssh.py [-h] [-P PASSLIST] [-u USER] host - - SSH Bruteforce Python script. - - positional arguments: - host Hostname or IP Address of SSH Server to bruteforce. - - optional arguments: - -h, --help show this help message and exit - -P PASSLIST, --passlist PASSLIST - File that contain password list in each line. - -u USER, --user USER Host username. - ``` ## UTILISATION @@ -35,6 +15,8 @@ If you want to bruteforce against the server `192.168.1.101` for example, the us python bruteforce_ssh.py 192.168.1.101 -u root -P wordlist.txt ``` +Note: Le résultat est inscrit dans un fichier credentials.txt + ## UPDATE - [x] 09/11/22: add "allow_agent=False,look_for_keys=False" to client.connect() args to avoid "Quota exceeded, retrying with delay..." error. \ No newline at end of file diff --git a/wordlist.txt b/wordlist.txt index 98e08ab..f412c4f 100644 --- a/wordlist.txt +++ b/wordlist.txt @@ -19,6 +19,7 @@ jessica 111111 ashley 000000 +puce iloveu michelle tigger