Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update Readme.md #5

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
24 changes: 16 additions & 8 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,15 @@

Cleveridge SSH Scanner
======================
####IMPORTANT:

#### IMPORTANT:

>This tool is for ethical testing purpose only.
>Cleveridge and its owners can't be held responsible for misuse by users.
>Users have to act as permitted by local law rules.

##What is the Cleveridge SSH Scanner
## What is the Cleveridge SSH Scanner

The Cleveridge SSH Scanner is a SSH Brute Force tool written in python. The tool tries to get access to machines (IPv4) on the SSH port (22). When the machines is accessible on port 22, the tool brute forces the ssh login with the most common default user names and passwords.

The tool offers you the options to attack
Expand All @@ -16,17 +19,20 @@ The tool offers you the options to attack
- IP's listed in a file


##Tested
## Tested

At this moment the Cleveridge SSH Scanner is only tested in a Linux Kali environment with Python 2.7 installed.
The Cleveridge SSH Scanner is also successfully tested in combination with Proxychains 3.1 (http://proxychains.sourceforge.net/) and Tor (https://www.torproject.org/) to hide the ip of the user.

Make sure that ``pexpect`` is part of the remote machine's Python installation when you first execute Cleveridge SSH Scanner.

## How to use in Linux

##How to use in Linux
1. Download the Cleveridge SSH Scanner files into a directory of your choise and chmod it so you are allowed to execute it.

2. In Terminal, go to the Cleveridge SSH Scanner directory and execute:
```./cl_ssh_scan.py ```

or

1. Be sure you have Tor and Proxychains 3.1 installed.
Expand All @@ -47,19 +53,21 @@ or
```service tor start ```
```proxychains ./cl_ssh_scan.py ```

##On the first run...
## On the first run...

...the Cleveridge SSH Scanner will automatically install the following folders:
- log : in this folder all the log files of scans will be saved
- cnf : configurations folder
- data : in this folder the user can store files containing lists of ip addresses he/she wants to scan

##Contact Info
## Contact Info

**Cleveridge** - Ethical Hacking Lab
De Brulen 28
2370 Arendonk
Belgium
https://cleveridge.org

##Developer
## Developer
**Erwin De Laat** [ redN00ws ]
https://twitter.com/erwindelaat