Sunday, June 5, 2022
HomeHackerSSH Pivoting Script For Increasing Assault Surfaces On Native Networks

SSH Pivoting Script For Increasing Assault Surfaces On Native Networks




Simply broaden your assault floor on an area community by discovering extra hosts, by way of SSH.

Utilizing a machine operating a SSH service, Puwr makes use of a given subnet vary to scope out IP’s, sending again any profitable ping requests it has. This can be utilized to broaden out an assault floor on an area community, by forwarding you hosts you could not usually attain from your personal gadget.

(instance beneath of how Puwr handles requests) 

Puwr is easy to run, solely requiring 4 flags:
python3 puwr.py (MACHINE IP) (USER) (PASSWORD) (SUBNET VALUE)

instance:
python3 puwr.py 10.0.0.53 xeonrx password123 10.0.0.1/24

If it’s essential join by a port aside from 22, use the -p flag. (instance: -p 2222)
If you wish to hold quiet, use the -s flag to attend specified seconds between request. (instance: -s 5)
Use the -h flag for utilization reference within the script.

The paramiko and netaddr modules are required for this script to work!
You may set up them with the pip device:
pip set up netaddr paramiko

Be aware this script is purley only a small enumeration script, and doesn’t instantly assault any discovered units on the community. Wether you resolve to stay persistence on the machine and use it to assault different units from it, is your selection.

I encourage you perform these methods with permission, and keep within the authorized sure of issues. Cyber assaults are extremely unlawful, and nobody however you is liable for any crime.

Puwr makes use of the MIT License. You may examine it right here:

MIT License

Copyright (c) 2022 ciiphys

Permission is hereby granted, freed from cost, to any particular person acquiring a duplicate
of this software program and related documentation information (the "Software program"), to deal
within the Software program with out restriction, together with with out limitation the rights
to make use of, copy, modify, merge, publish, distribute, sublicense, and/or promote
copies of the Software program, and to allow individuals to whom the Software program is
furnished to take action, topic to the next situations:

The above copyright discover and this permission discover shall be included in all
copies or substantial parts of the Software program.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABIL ITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments