Skip to content

This project is an SSH brute force tool for security testing, attempting logins using wordlists. It includes SSH setup guides for Windows and Linux and security measures like strong passwords, fail2ban, and disabling root login.

Notifications You must be signed in to change notification settings

kingslayer458/SSH-login-using-brute-force

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

SSH Login Using Brute Force

SSH brute force tools are used to attempt to gain unauthorized access to an SSH server by repeatedly trying different username and password combinations. These tools can be used to attack both weak and strong passwords, but they are most effective against weak ones.

Disclaimer: This tool is for educational and security testing purposes only. Do not use it for unauthorized access to any system.

Features

  • Attempts login using a wordlist of usernames and passwords.
  • Supports custom SSH host and port.
  • Can be used by security professionals to test SSH security.

Setting Up an SSH Server

Windows Setup

  1. Open Settings > Apps > Optional Features.
  2. Check if OpenSSH Client is installed. If not, click Add a Feature.
  3. Search for OpenSSH Client and install it.
  4. Start Command Prompt as an Administrator.

Linux Setup

Installing SSH Client

sudo apt install openssh-client

To connect to an SSH server:

ssh user@server-ip

Setting Up SSH Server on Ubuntu

  1. Open your terminal.
  2. Install OpenSSH server:
    sudo apt install openssh-server
  3. Enable SSH server:
    sudo systemctl enable ssh
  4. Allow SSH through the firewall:
    sudo ufw allow ssh
  5. Now your SSH server is running!

Running the SSH Brute Force Tool

To use the brute force script, run the following command in Command Prompt (cmd):

python ssh-bf.py --users <path_to_user_wordlist> --passes <path_to_password_wordlist> --host <target_ip>

Example

python ssh-bf.py --users D:\PT1\users.txt --passes D:\PT1\pass.txt --host 192.168.1.3

Preventing SSH Brute Force Attacks

To secure your SSH server:

  • Use strong passwords or SSH key authentication.
  • Change the default SSH port (edit /etc/ssh/sshd_config).
  • Use fail2ban to block repeated failed login attempts:
    sudo apt install fail2ban
  • Disable root login by setting PermitRootLogin no in /etc/ssh/sshd_config.

Screenshot

Brute Force Attack Brute Force Attack Brute Force Attack


License

This project is for ethical hacking and security research purposes only. Unauthorized use is strictly prohibited.

Happy Ethical Hacking! 🚀

About

This project is an SSH brute force tool for security testing, attempting logins using wordlists. It includes SSH setup guides for Windows and Linux and security measures like strong passwords, fail2ban, and disabling root login.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages