baff3r / cleveridge-ssh-scanner

The Cleveridge SSH Scanner is a SSH Brute Force tool written in python. The tool tries to get access to machines (IPv4) on the SSH port (22). When the machines is accessible on port 22, the tool brute forces the ssh login with the most common default user names and passwords.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Cleveridge logo

Cleveridge SSH Scanner

####IMPORTANT:

This tool is for ethical testing purpose only.
Cleveridge and its owners can't be held responsible for misuse by users.
Users have to act as permitted by local law rules.

##What is the Cleveridge SSH Scanner The Cleveridge SSH Scanner is a SSH Brute Force tool written in python. The tool tries to get access to machines (IPv4) on the SSH port (22). When the machines is accessible on port 22, the tool brute forces the ssh login with the most common default user names and passwords.

The tool offers you the options to attack

  • one IP
  • a range of IP's (e.g. 192.168.0.1-25)
  • IP's listed in a file

##Tested At this moment the Cleveridge SSH Scanner is only tested in a Linux Kali environment with Python 2.7 installed.
The Cleveridge SSH Scanner is also successfully tested in combination with Proxychains 3.1 (http://proxychains.sourceforge.net/) and Tor (https://www.torproject.org/) to hide the ip of the user.

##How to use in Linux

  1. Download the Cleveridge SSH Scanner files into a directory of your choise and chmod it so you are allowed to execute it.

  2. In Terminal, go to the Cleveridge SSH Scanner directory and execute:
    ./cl_ssh_scan.py

or

  1. Be sure you have Tor and Proxychains 3.1 installed.
    if you have problems installing these programs there is enough documentation available online.

  2. Edit your proxychains configuration file:
    Most of the time you will find this file at /etc/proxychains.conf
    What to change...
    1st : uncomment 'dynamic_chain' (remove the # in front of it)
    2nd : comment 'strict_chain' and 'ramdom chain' (add a # in front of it)
    3th : Below [ProxyList], add your Tor Listener settings, this could be
    socks4 127.0.0.1 9050
    More info : http://www.shellhacks.com/en/Anonymous-Port-Scanning-Nmap-Tor-ProxyChains

  3. Download the Cleveridge SSH Scanner files into a directory of your choise and chmod it so you are allowed to execute it.

  4. In Terminal, go to the Cleveridge SSH Scanner directory and execute:
    service tor start
    proxychains ./cl_ssh_scan.py

##On the first run... ...the Cleveridge SSH Scanner will automatically install the following folders:

  • log : in this folder all the log files of scans will be saved
  • cnf : configurations folder
  • data : in this folder the user can store files containing lists of ip addresses he/she wants to scan

##Contact Info Cleveridge - Ethical Hacking Lab
De Brulen 28
2370 Arendonk
Belgium
https://cleveridge.org

##Developer Erwin De Laat [ redN00ws ]
https://twitter.com/erwindelaat

About

The Cleveridge SSH Scanner is a SSH Brute Force tool written in python. The tool tries to get access to machines (IPv4) on the SSH port (22). When the machines is accessible on port 22, the tool brute forces the ssh login with the most common default user names and passwords.

License:GNU General Public License v3.0


Languages

Language:Python 100.0%