This document discusses creating a basic SSH botnet using Python. It explains that the code will use object-oriented concepts and the pexpect library's pxssh module to connect to SSH servers and store those connections. The connections can then be sent commands from the botnet program. Creating the botnet involves making a client class to handle each connection and storing clients in a list. The next step discussed is SSH bruteforcing.
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
209 views
Basic SSH Botnet: Hacking With Python #8
This document discusses creating a basic SSH botnet using Python. It explains that the code will use object-oriented concepts and the pexpect library's pxssh module to connect to SSH servers and store those connections. The connections can then be sent commands from the botnet program. Creating the botnet involves making a client class to handle each connection and storing clients in a list. The next step discussed is SSH bruteforcing.
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 6
Basic SSH botNet
Hacking with Python #8
Preamble Our code will use some object oriented concepts If you have not worked with classes and objects before I suggest looking at my intermediate python tutorials What is a SSH? An encrypted remote terminal connection Allows command line access to the device Most managed networks will use SSH for management of routers, switches and servers. SHH is simple yet complex, Some reading would be highly beneficial. How it works We use the python pexpect library with the pxssh module to connect to the ssh server. We then store that connection and leave it waiting for a command Then we send a command to all of the connections open in the botNet (Because the current version of pxssh.py is broken I have supplied a fixed version in the tutorial folder) Creating our program Make sure you have the pxssh.py file in the same folder as our botnet.py file We will create a client class which will hand each of our connection We will store each client in a list. Next SSH bruteforce