Skip to content

Latest commit

 

History

History
63 lines (48 loc) · 1.95 KB

README.md

File metadata and controls

63 lines (48 loc) · 1.95 KB

SSHDODGE

Tool used to test weakness of some ssh passwords, thanks to a dictionary attack (bypassing fail2ban protection).

Copyright (C) 2017 Neetx

Sshdodge is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

Sshdodge is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program. If not, see http://www.gnu.org/licenses/

CONTACTS:

Neetx


Tool developed to demonstrate the weakness of some ssh passwords. It bypasses fail to ban protection changing ip with tor reload function, after some attempts defined in input by user. Use these tool with consciousness.

Usage:

sshdodge.py [-h] [-u USER] [-i IP] [-p PORT] [-a ATTEMPTS] [-t] wordlist

positional arguments:
  wordlist              Wordlist for dictionary attack

optional arguments:
  -h, --help            show this help message and exit
  -u USER, --user USER  User used to connection
  -i IP, --ip IP        Destination ip address
  -p PORT, --port PORT  Destination port
  -a ATTEMPTS, --attempts ATTEMPTS
                        Number of attempts before identity change
  -t, --test            Use the to test dependences

Example:

sudo ./sshdodge -u root -i 127.0.0.1 -p 22 wordlist.txt -a 3

DEPENDENCES: You need to install on your system:

  • tor
  • sshpass
  • proxychains

SYSTEM USED:

  • Debian 9.2
COLLABORATIONS: