Skip to content

Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.

License

Notifications You must be signed in to change notification settings

open-honeypot/brutekrag

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

24 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

license GitHub contributors PyPI

brutekrag

Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.

brute krag means "brute force" in afrikáans

Disclaimer

This tool is for ethical testing purpose only.
brutekrag and its owners can't be held responsible for misuse by users.
Users have to act as permitted by local law rules.

Requeriments

Installation

It can be easily installed using pip

pip install brutekrag

Then you can do

$ brutekrag --help

usage: brutekrag [-h] [-t TARGET] [-T TARGETS] [-pF PASSWORDS] [-uF USERS]
                 [-sF SINGLE] [--separator SEPARATOR] [-p PORT] [-u USER]
                 [-P PASSWORD] [--timeout TIMEOUT] [--threads THREADS]
                 [-o OUTPUT] [--progress] [-v] [--version]

      _                _       _
     | |              | |     | |
     | |__  _ __ _   _| |_ ___| | ___ __ __ _  __ _
     | '_ \| '__| | | | __/ _ \ |/ / '__/ _` |/ _` |
     | |_) | |  | |_| | ||  __/   <| | | (_| | (_| |
     |_.__/|_|   \__,_|\__\___|_|\_\_|  \__,_|\__, |
            OpenSSH Brute force tool 0.3.1     __/ |
          (c) Copyright 2014 Jorge Matricali  |___/
          

optional arguments:
  -h, --help            show this help message and exit
  -t TARGET, --target TARGET
                        Target hostname or IPv4.
  -T TARGETS, --targets TARGETS
                        Targets file that containas one hostname or IPv4 per line.
  -pF PASSWORDS, --passwords PASSWORDS
                        Path to password dictionary file. One password per line.
  -uF USERS, --users USERS
                        Path to users list file. One user per line.
  -sF SINGLE, --single SINGLE
                        Path to a file that contains a combination of both username and password. One combination per line, separated by space character by default.
  --separator SEPARATOR
                        Custom username/password separator. It's should be used in conjunction with -sF.
  -p PORT, --port PORT  Target port (default 22).
  -u USER, --user USER  Single user bruteforce.
  -P PASSWORD, --password PASSWORD
                        Single password bruteforce.
  --timeout TIMEOUT     Connection timeout (in seconds, 1 default).
  --threads THREADS     Total number of threads to use (default 1).
  -o OUTPUT, --output OUTPUT
                        Output file for compromised hosts.
  --progress            Progress bar.
  -v, --verbose         Verbose output.
  --version             Prints version and banner.

Example usages

# One target, one user, many passwords
brutekrag -t 10.10.0.14 --user root --passwords passwords.txt
# Many targets, one user, empty password
brutekrag -T targets.txt --user root --password ''
# One target, many pre-made combinations of user and password
brutekrag -t 192.168.0.1 --single combined.txt

About

Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Python 100.0%