22 lines
		
	
	
		
			804 B
		
	
	
	
		
			Markdown
		
	
	
	
	
	
			
		
		
	
	
			22 lines
		
	
	
		
			804 B
		
	
	
	
		
			Markdown
		
	
	
	
	
	
| # [How to Brute-Force SSH Servers in Python](https://www.thepythoncode.com/article/brute-force-ssh-servers-using-paramiko-in-python)
 | |
| 
 | |
| Ce projet (à titre pédagogique) montre l'utilisation d'un script python permettant de faire une attaque par brute force au dictionnaire (wordlist.txt).
 | |
| 
 | |
| ## INSTALLATION 
 | |
| 
 | |
| ```bash
 | |
| python3 -m pip install -r requirements.txt
 | |
| ```
 | |
| 
 | |
| ## UTILISATION
 | |
| 
 | |
| If you want to bruteforce against the server `192.168.1.101` for example, the user `root` and a password list of `wordlist.txt`:
 | |
| ```bash
 | |
| python bruteforce_ssh.py 192.168.1.101 -u root -P wordlist.txt
 | |
| ```
 | |
| 
 | |
| > Note: Le résultat est inscrit dans un fichier credentials.txt
 | |
| 
 | |
| ## UPDATE
 | |
| 
 | |
| - [x] 09/11/22: add "allow_agent=False,look_for_keys=False" to client.connect() args to avoid "Quota exceeded, retrying with delay..." error.   | 
