main
greglebreton 2 years ago
parent 7665f5b8fa
commit d30ab8deb7
  1. 26
      README.md
  2. 1
      wordlist.txt

@ -1,31 +1,11 @@
# [How to Brute-Force SSH Servers in Python](https://www.thepythoncode.com/article/brute-force-ssh-servers-using-paramiko-in-python) # [How to Brute-Force SSH Servers in Python](https://www.thepythoncode.com/article/brute-force-ssh-servers-using-paramiko-in-python)
This project aims to demonstrate botted SSH brute force hacking with a Python script. Ce projet (à titre pédagogique) montre l'utilisation d'un script python permettant de faire une attaque par brute force au dictionnaire (wordlist.txt).
It is used with a dictionnary (wordlist.txt).
## INSTALLATION ## INSTALLATION
```bash ```bash
pip3 install -r requirements.txt python3 -m pip install -r requirements.txt
```
- Help:
```bash
python bruteforce_ssh.py --help
```
**Output:**
```bash
usage: bruteforce_ssh.py [-h] [-P PASSLIST] [-u USER] host
SSH Bruteforce Python script.
positional arguments:
host Hostname or IP Address of SSH Server to bruteforce.
optional arguments:
-h, --help show this help message and exit
-P PASSLIST, --passlist PASSLIST
File that contain password list in each line.
-u USER, --user USER Host username.
``` ```
## UTILISATION ## UTILISATION
@ -35,6 +15,8 @@ If you want to bruteforce against the server `192.168.1.101` for example, the us
python bruteforce_ssh.py 192.168.1.101 -u root -P wordlist.txt python bruteforce_ssh.py 192.168.1.101 -u root -P wordlist.txt
``` ```
Note: Le résultat est inscrit dans un fichier credentials.txt
## UPDATE ## UPDATE
- [x] 09/11/22: add "allow_agent=False,look_for_keys=False" to client.connect() args to avoid "Quota exceeded, retrying with delay..." error. - [x] 09/11/22: add "allow_agent=False,look_for_keys=False" to client.connect() args to avoid "Quota exceeded, retrying with delay..." error.

@ -19,6 +19,7 @@ jessica
111111 111111
ashley ashley
000000 000000
puce
iloveu iloveu
michelle michelle
tigger tigger

Loading…
Cancel
Save