Skip to content

Embontooth/SSHCracker-Advanced-

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 

Repository files navigation

SSH Cracker Advanced

A multi-threaded SSH brute force tool written in Python with password generation capabilities and robust error handling.

Features

  • Multi-threaded brute forcing for faster credential testing
  • Password generation with customizable character sets and lengths
  • Flexible input options - single user/password or wordlists
  • Robust error handling with retry mechanisms
  • Color-coded output for better readability
  • Automatic credential saving when successful
  • SSH connection timeout handling

Installation

Prerequisites

  • Python 3.6 or higher
  • Required Python packages:
pip install paramiko colorama

Clone or Download

git clone <repository-url>
cd SSHCrackerAdv

Usage

Basic Syntax

python sshcracker.py <target_host> [options]

Command Line Arguments

Argument Description
host Target hostname or IP address (required)
-u, --user Single username to test
-U, --userlist File containing usernames (one per line)
-P, --passlist File containing passwords (one per line)
--generate Generate passwords on the fly
--min-length Minimum password length for generation (default: 1)
--max-length Maximum password length for generation (default: 4)
--chars Character set for password generation
--threads Number of concurrent threads (default: 4)

Examples

Using wordlists:

# Single user with password list
python sshcracker.py 192.168.1.100 -u admin -P passwords.txt

# Multiple users with password list
python sshcracker.py 192.168.1.100 -U users.txt -P passwords.txt

# Multi-threaded attack
python sshcracker.py 192.168.1.100 -U users.txt -P passwords.txt --threads 8

Using password generation:

# Generate passwords with default settings (1-4 chars, lowercase + digits)
python sshcracker.py 192.168.1.100 -u admin --generate

# Custom password generation
python sshcracker.py 192.168.1.100 -u admin --generate --min-length 3 --max-length 6 --chars "abc123"

# Generate with uppercase, lowercase, and digits
python sshcracker.py 192.168.1.100 -u admin --generate --chars "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789"

File Formats

Username File (users.txt)

admin
user
root
guest
test

Password File (passwords.txt)

password
123456
admin
password123
qwerty

Output

The tool provides color-coded output:

  • 🔴 Red: Failed attempts and errors
  • 🔵 Blue: Informational messages and retries
  • 🟢 Green: Successful credential discovery

Successful Attack Example:

[+] Found combo:
    HOSTNAME: 192.168.1.100
    USERNAME: admin
    PASSWORD: password123

Features Details

Error Handling

  • Connection timeouts: Automatically handles unreachable hosts
  • Authentication failures: Logs failed attempts
  • SSH exceptions: Implements retry mechanism with exponential backoff
  • Rate limiting: Built-in delays to prevent overwhelming the target

Security Features

  • Credential saving: Successful credentials are saved to credentials.txt
  • Thread safety: Safe concurrent operation
  • Clean shutdown: Stops all threads when credentials are found

Performance

  • Multi-threading: Configurable number of worker threads
  • Queue-based processing: Efficient task distribution
  • Early termination: Stops immediately when credentials are found

Important Notes

Legal Disclaimer

⚠️ WARNING: This tool is for educational and authorized penetration testing purposes only. Only use this tool on systems you own or have explicit permission to test. Unauthorized access to computer systems is illegal and may result in severe legal consequences.

Ethical Usage

  • Only test on your own systems or with written authorization
  • Respect rate limits to avoid overwhelming target systems
  • Use responsible disclosure for any vulnerabilities found
  • Follow local laws and regulations

Best Practices

  • Start with a small number of threads to avoid detection
  • Use realistic wordlists rather than exhaustive generation
  • Monitor network traffic to avoid triggering security systems
  • Always obtain proper authorization before testing

Troubleshooting

Common Issues

  1. "Host unreachable": Check network connectivity and firewall settings
  2. "SSH Exception": The tool will automatically retry with exponential backoff
  3. "Permission denied": Normal behavior for incorrect credentials
  4. High CPU usage: Reduce thread count or password generation complexity

Performance Tips

  • Use wordlists instead of generation for better performance
  • Adjust thread count based on target system capabilities
  • Consider using smaller character sets for password generation

Contributing

Feel free to contribute by:

  • Reporting bugs
  • Suggesting new features
  • Submitting pull requests
  • Improving documentation

License

This project is for educational purposes only. Use responsibly and ethically.

About

Brute for SSH (slighlty better)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages