Skip to content

The Cleveridge SSH Scanner is a SSH Brute Force tool written in python. The tool tries to get access to machines (IPv4) on the SSH port (22). When the machines is accessible on port 22, the tool brute forces the ssh login with the most common default user names and passwords.

License

Notifications You must be signed in to change notification settings

looplife55/cleveridge-ssh-scanner

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

40 Commits
 
 
 
 
 
 

Repository files navigation

Cleveridge logo

Cleveridge SSH Scanner

####IMPORTANT:

This tool is for ethical testing purpose only.
Cleveridge and its owners can't be held responsible for misuse by users.
Users have to act as permitted by local law rules.

##What is the Cleveridge SSH Scanner The Cleveridge SSH Scanner is a SSH Brute Force tool written in python. The tool tries to get access to machines (IPv4) on the SSH port (22). When the machines is accessible on port 22, the tool brute forces the ssh login with the most common default user names and passwords.

The tool offers you the options to attack

  • one IP
  • a range of IP's (e.g. 192.168.0.1-25)
  • IP's listed in a file

##Tested At this moment the Cleveridge SSH Scanner is only tested in a Linux Kali environment with Python 2.7 installed.
The Cleveridge SSH Scanner is also successfully tested in combination with Proxychains 3.1 (http://proxychains.sourceforge.net/) and Tor (https://www.torproject.org/) to hide the ip of the user.

##How to use in Linux

  1. Download the Cleveridge SSH Scanner files into a directory of your choise and chmod it so you are allowed to execute it.

  2. In Terminal, go to the Cleveridge SSH Scanner directory and execute:
    ./cl_ssh_scan.py

or

  1. Be sure you have Tor and Proxychains 3.1 installed.
    if you have problems installing these programs there is enough documentation available online.

  2. Edit your proxychains configuration file:
    Most of the time you will find this file at /etc/proxychains.conf
    What to change...
    1st : uncomment 'dynamic_chain' (remove the # in front of it)
    2nd : comment 'strict_chain' and 'ramdom chain' (add a # in front of it)
    3th : Below [ProxyList], add your Tor Listener settings, this could be
    socks4 127.0.0.1 9050
    More info : http://www.shellhacks.com/en/Anonymous-Port-Scanning-Nmap-Tor-ProxyChains

  3. Download the Cleveridge SSH Scanner files into a directory of your choise and chmod it so you are allowed to execute it.

  4. In Terminal, go to the Cleveridge SSH Scanner directory and execute:
    service tor start
    proxychains ./cl_ssh_scan.py

##On the first run... ...the Cleveridge SSH Scanner will automatically install the following folders:

  • log : in this folder all the log files of scans will be saved
  • cnf : configurations folder
  • data : in this folder the user can store files containing lists of ip addresses he/she wants to scan

##Contact Info Cleveridge - Ethical Hacking Lab
De Brulen 28
2370 Arendonk
Belgium
https://cleveridge.org

##Developer Erwin De Laat [ redN00ws ]
https://twitter.com/erwindelaat

About

The Cleveridge SSH Scanner is a SSH Brute Force tool written in python. The tool tries to get access to machines (IPv4) on the SSH port (22). When the machines is accessible on port 22, the tool brute forces the ssh login with the most common default user names and passwords.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Python 100.0%