ssh keyscanner - search shodan for a given ssh hostkey fingerprint.
This tool has two modes, currently. It can search given a public-key you provide it, or, it can fingerprint a host and search shodan for similar hosts.
It currently is incomplete (see the todo list), but works for those uses.
It now has support for doing the keygrab over tor, and works on hidden services. This is useful for finding, uh, shittily configured ones.
The tool has 4 args, outlined below.
- "-i", for target host. You must set either this, -l, or -f.
- "-f", for SSH Public Key file. You must set either this, -f, or -i.
- "-l", for lists of target hosts. Alternative to -i or -f.
- "-d", for directories of keys. Not yet implemented!
- "-p", for target port. This defaults to 22.
- "-t", uses Tor for the SSH key grabbing. Good for Hidden Services ;)
Note: I only bothered testing on python2.
- Private-Key support so I can also use privkeys as well as pubkeys.
- Directory of keyfile support.
- List of hosts support.
- idk, make a git issue with your ideas...
Send yer cryptologically generated beer tokens to fuel further opensource software:
coinbase, for convenience, or the following bitcoin address:
Mandatory asciicast until I finish it and make a proper video
Bug Reports and Feature Requests
Please submit all bug reports and feature requests to the Github Issue Tracker. Give me stacktraces by enabling debug mode.
18-01-2015 (01:26): - Added Tor support on a whim. Completely untested, will get tested in the morning when I wake up.