Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: SpoofIMEI/ssb
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v11.1.0
Choose a base ref
...
head repository: SpoofIMEI/ssb
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: main
Choose a head ref

Commits on May 29, 2022

  1. ssb_Markv11

    Upgrades people! upgrades!
    SpoofIMEI authored May 29, 2022
    Copy the full SHA
    24856f7 View commit details
  2. Mark_v11

    SpoofIMEI authored May 29, 2022
    Copy the full SHA
    2d2c1d7 View commit details
  3. Delete ssb.py

    SpoofIMEI authored May 29, 2022
    Copy the full SHA
    9291bf2 View commit details

Commits on Jun 3, 2022

  1. Mark_v11.2.1

    SpoofIMEI authored Jun 3, 2022
    Copy the full SHA
    de3373e View commit details
  2. Mark_v11.2.1

    SpoofIMEI authored Jun 3, 2022
    Copy the full SHA
    9c55727 View commit details
  3. Update README.md

    SpoofIMEI authored Jun 3, 2022
    Copy the full SHA
    a784f48 View commit details

Commits on Jun 4, 2022

  1. Mark_v13.3.2

    SpoofIMEI authored Jun 4, 2022
    Copy the full SHA
    b5730c5 View commit details
  2. Copy the full SHA
    e9c6d71 View commit details
  3. Copy the full SHA
    f69c044 View commit details
  4. Copy the full SHA
    b4d187c View commit details
  5. Update README.md

    SpoofIMEI authored Jun 4, 2022
    Copy the full SHA
    b6dc261 View commit details

Commits on Jun 10, 2022

  1. Installation script :D

    SpoofIMEI authored Jun 10, 2022
    Copy the full SHA
    bb01f2c View commit details
  2. Update README.md

    SpoofIMEI authored Jun 10, 2022
    Copy the full SHA
    572289d View commit details
  3. Update install.sh

    SpoofIMEI authored Jun 10, 2022
    Copy the full SHA
    cd90b4f View commit details

Commits on Jul 17, 2022

  1. Update README.md

    SpoofIMEI authored Jul 17, 2022
    Copy the full SHA
    e8df4c7 View commit details
  2. Markv_13.3.3

    SpoofIMEI authored Jul 17, 2022
    Copy the full SHA
    e15687c View commit details
  3. Update README.md

    SpoofIMEI authored Jul 17, 2022
    Copy the full SHA
    9814b11 View commit details

Commits on Aug 5, 2022

  1. Update README.md

    SpoofIMEI authored Aug 5, 2022
    Copy the full SHA
    39fec66 View commit details

Commits on Dec 14, 2022

  1. Update README.md

    SpoofIMEI authored Dec 14, 2022
    Copy the full SHA
    bee3840 View commit details

Commits on Mar 10, 2023

  1. Update README.md

    SpoofIMEI authored Mar 10, 2023
    Copy the full SHA
    b7d3933 View commit details
  2. Create license

    SpoofIMEI authored Mar 10, 2023
    Copy the full SHA
    3564a41 View commit details
Showing with 470 additions and 114 deletions.
  1. +68 −49 README.md
  2. +13 −0 install.sh
  3. +5 −2 json_data/parameters.json
  4. +201 −0 license
  5. +2 −0 modules/paramiko/transport.py
  6. +36 −11 network/additional.py
  7. +4 −1 network/brute.py
  8. +88 −51 ssb.py → ssb
  9. +53 −0 wordlists/extensions
117 changes: 68 additions & 49 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,17 +1,19 @@
# SSB
# THIS PROJECT IS NO L0NGER MAINTAINED, PLEASE USE AWACS-SCANNER INSTEAD

## SSB
![image](https://user-images.githubusercontent.com/72181445/153228795-7346bd04-69eb-4205-9d27-c104ad7295ea.png)
# Current version: Mark_V10
### Current version: Mark_V13.3.3

# Put on the night apparence mode so the logos look alot cooler :)
## Put on the night apparence mode so the logos look alot cooler :)

# Description
## Description
SSB=simple subdomain bruteforcer

SSB Tries to find subdomains for a domain and scan them for ports/services. When SSB has identified all of the services the subdomain is running, it will then scan the services for common misconfigurations and credentials.

SSB scans the subdomains for the most common ports and services i've seen in the wild.

# Update log (only major updates)
## Update log (only major updates)
Update: Mark_v0: Scans for ports in the found subdomains.

Update: Mark_v3: SSH Bruteforce added and ftp threads increased, problems with report generating solved.
@@ -27,55 +29,69 @@ Update: Mark_v8: Added flags and hotfixes
Update: Mark_v9: Added new scan type: light_scan (only service detection)

Update: Mark_v10: Flag ui upgraded to argparse
# Under dev?: Currently yes

# BACKGROUND:
I started this project on 2.2.2022

# HOW TO SETUP:

pip3 install requests

pip3 install termcolor

pip3 install ftplib
Update: Mark_v11: ssb now uses 3 different programs to find subdomains (sublis3r,findomain,assetfinder)

pip3 install paramiko
Update: Mark_v11.2.1: Added url discovery and finding sensitive files in those urls, fixed bug in color handling

sudo apt-get install libmariadb3 libmariadb-dev
Update: Mark_v13.3.2: Added target list mode, colored errors, fixed alot of stuff :D
## Under dev?: NO

pip3 install mariadb

pip3 install smbprotocol

pip3 install telnetlib
## BACKGROUND:
I started this project on 2.2.2022

## HOW TO SETUP:
```
chmod +x install.sh
./install.sh
```
And you're done, now just launch the app using PYTHON3

python3 ssb.py

# Usage:
--help (not_necessary) Displays the help page

-h (necessary) Hostname to scan

--scan-type (necessary) Scan types: Validate, light_scan, scan Validate=validates if subdomain exists light_scan=service detection scan=all of the mentioned + bruteforce

-s (necessary) Subdomain find method: 1=Sublist3r 2=Wordlist 3=Only this domain

--dns-threads (not_necessary) The amount of threads that will validate subdomains (default=10)

--web-threads (not_necessary) The amount of threads that will be requesting files in the http discovery phase (works only with scan scan_type) (Default:40)

-w (not_necessary) Wordlist (used with -s 2)

# Examples:
python3 ssb.py -t somerandomassdomain.com -s 1 --scan-type scan

python3 ssb.py -t somerandomassdomain.com -s 2 -w subdomains.txt --scan-type light_scan

python3 ssb.py -t somerandomassdomain.com -s 1 --scan-type validate

`python3 ssb`

## Usage:
```
-h, --help show this help message and exit
-t [TARGET], --target [TARGET]
(not_necessary) Target to scan
-tl [TARGET_LIST], --target-list [TARGET_LIST]
(not_necessary) Target list (used with -s 4)
--scan-type SCAN_TYPE, --scan-type SCAN_TYPE
(necessary) Scan types: Validate, light_scan,
scan Validate=validates if subdomain exists
light_scan=service detection scan=all of the mentioned
+ bruteforce
-s SCAN_METHOD, --scan-method SCAN_METHOD
(necessary) Subdomain find method:
1=Automated 2=Wordlist 3=Only this domain 4=Read
targets from a list (no subdomain enumeration)
--dns-threads [DNS_THREADS], --dns-threads [DNS_THREADS]
(not_necessary) The amount of threads that will
validate subdomains (default=10)
--web-threads [WEB_THREADS], --web-threads [WEB_THREADS]
(not_necessary) The amount of threads that will be
requesting files in the http discovery phase (works
only with scan scan_type) (Default:40)
-w [WORDLIST], --wordlist [WORDLIST]
(not_necessary) Wordlist (used with -s 2)
```
## Examples:
```
./ssb -t somerandomassdomain.com -s 1 --scan-type scan
./ssb -t somerandomassdomain.com -s 2 -w subdomains.txt --scan-type light_scan
./ssb -t somerandomassdomain.com -s 1 --scan-type validate
./ssb -tl hosts.txt -s 4 --scan-type scan
```
# Features:
<img src="https://user-images.githubusercontent.com/72181445/153476377-b250f42b-b0c0-4153-bc58-e42a9146d960.png" width=200></img>

@@ -107,6 +123,7 @@ Http/Https File Discovery

Http/Https Method Scan

Url discovery, sensitive file discovery

<img src="https://user-images.githubusercontent.com/72181445/153479607-5ba66053-b54b-408c-9ac1-ca7e373cb083.png" width=200></img>

@@ -118,7 +135,9 @@ Telnet Bruteforce
Rpcbind Process Lister


# TECHNICAL DETAILS:


## TECHNICAL DETAILS:

+Uses DNS resolving instead of a port specific or ping scan.

@@ -129,7 +148,7 @@ Rpcbind Process Lister
+Validates HTTP and HTTPS ports by actually making a request instead of relying off the fact that it is open (many http/https ports that i've seen in the wild are timeouts)


-+Easy to use so that it is fast for pen-testers but also script kiddies can operate this which is bad (Unlike nmap which needs flags to be set right)...
-+Easy to use so that it is fast for pen-testers but also script kiddies can operate this which is bad...

+Automatically scans subdomains without having the need for the hassle of scanning subdomains, making a list, nmap scanning them.

13 changes: 13 additions & 0 deletions install.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
pip3 install requests
pip3 install termcolor
pip3 install ftplib
pip3 install paramiko
sudo apt-get install libmariadb3 libmariadb-dev
apt install golang
pip3 install mariadb
pip3 install smbprotocol
pip3 install telnetlib
go get -u github.com/tomnomnom/assetfinder
wget https://github.com/findomain/findomain/releases/latest/download/findomain-linux && chmod +x findomain-linux && cp findomain-linux /usr/bin/findomain
git clone https://github.com/signedsecurity/sigurlfind3r.git && cd sigurlfind3r/cmd/sigurlfind3r/ && go build; mv sigurlfind3r /usr/local/bin/
echo "SSB INSTALLED!"
7 changes: 5 additions & 2 deletions json_data/parameters.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,7 @@
{
"params": {
"-t": "necessary",
"-t": "not_necessary",
"-tl": "not_necessary",
"--scan-type": "necessary",
"-s": "necessary",
"--dns-threads": "not_necessary",
@@ -9,13 +10,15 @@
},
"description": {
"-t": "Target to scan",
"-tl": "Target list (used with -s 4)",
"--scan-type": "Scan types: Validate, light_scan, scan Validate=validates if subdomain exists light_scan=service detection scan=all of the mentioned + bruteforce",
"-s": "Subdomain find method: 1=Sublist3r 2=Wordlist 3=Only this domain",
"-s": "Subdomain find method: 1=Automated 2=Wordlist 3=Only this domain 4=Read targets from a list (no subdomain enumeration)",
"--dns-threads": "The amount of threads that will validate subdomains (default=10)",
"--web-threads": "The amount of threads that will be requesting files in the http discovery phase (works only with scan scan_type) (Default:40)",
"-w": "Wordlist (used with -s 2)"
},
"fullname": {
"-tl": "--target-list",
"-t": "--target",
"-s": "--scan-method",
"-w": "--wordlist",
Loading