This is tutorial on writing a SSH bruteforce program. Try implementing Threading or merging it with the botNet! All Links and Slides will be in the description. Subscribe for more cool stuff!
Credit to TJ O'Connor for his brilliant book Violent Python for teaching me some of this stuff.
Slides & files (pxssh.py) - https://www.mediafire.com/folder/z4qp...
Python - http://python.org/
Ubuntu - http://www.ubuntu.com/
My Twitter: https://twitter.com/DrapsTV
If you like
During Internal penetration testing, sometimes you get an environment, where Antiviruses are up to date, which means that, you cannot use “fancy” shells to get a reverse shell as they get detected. Metasploit is obviously not an option here, as most (if not all) metasploit exploits and tools are flagged by Antiviruses as malicious.At that time you require , something very simple, that can evade the AntiViruses and also gets the job done. For that, i’m sharing a very simple Py
Python in penetration testing and you may use or tune the code for a real world case. Plus you will be aware of the effectiveness of client-side attack and the importance of programming your own weapon where other tools will fail in such a tough scenario. Example of how this works: Attacker Machine
>IP address : 10.0.2.15/24
>OS: BackTrack 5 R3
>Python Version: 2.6 Victim Machine
>IP address : 192.168.1.15/24
>OS: Windows 7 SP1 32 bit
>Zone Alarm Firewall and anti-virus
How it works It's not very complicated! I was already familiar with some of the rudiments of the IRC protocol from hacking on a simple IRC bot library. The parts that I needed to figure out were: ability to track when workers came on/off-line so they could be sent jobs easily pass data from operator -> workers and back again Worker registration The video above shows the process or registration that happens when a worker comes online. Workers must know beforehand the nick of t