Cerbrutus : Network Brute Force Tool, Written In Python

Cerbrutus is a Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services.

COMING SOON: SMB, HTTP(s) POST, HTTP(s) GET, HTTP BASIC AUTH Thanks to @0dayctf, Rondons, Enigma, and 001 for testing and contributing

Installation

cd /opt
git clone https://github.com/Cerbrutus-BruteForcer/cerbrutus

Usage

python3 /opt/cerbrutus/cerbrutus.py –help
usage: cerbrutus.py [-h] -U USERS -P PASSWORDS [-p PORT] [-t THREADS] [-q [QUIET [QUIET …]]] Host Service
Python based network brute forcing tool!
positional arguments:
Host The host to connect to – in IP or VHOST/Domain Name form
Service The service to brute force (currently implemented ‘SSH’)
optional arguments:
-h, –help show this help message and exit
-U USERS, –users USERS
Either a single user, or the path to the file of users you wish to use
-P PASSWORDS, –passwords PASSWORDS
Either a single password, or the path to the password list you wish to use
-p PORT, –port PORT The port you wish to target (only required if running on a non standard port)
-t THREADS, –threads THREADS
Number of threads to use
-q [QUIET [QUIET …]], –quiet [QUIET [QUIET …]]
Do not print banner

/opt/cerbrutus/cerbrutus.py 10.10.10.10 SSH -U “username” -P /opt/wordlists/fasttrack.txt -t 10
================================================================
_ _ _ _ _
/ ] / ]| \ | \ | | | || || | |/ /
/ / / [
| D )| o )| D ) | || || | ( _
/ / | ]| / | || /| | ||| ||| | |_ |
/ _ | [_ | \ | O || | : | | | | : |/ \ |
\ || || . | || . \ | | | | |\ |
____|||||_|||||_|__,| || _,_| _|
Network Brute Force Tool
https://github.com/Cerbrutus-BruteForcer/cerbrutus
================================================================
[] – Initialising password list… Read in 224 words from /opt/wordlists/fasttrack.txt [+] – Running with 10 threads… [] – Starting attack against username@10.10.10.10
[*] – Trying: 65/224

Test Run

# The password is in line number 12600 in rockyou
64 threads -> 1400 seconds ~ 7 minutes (hydra took 30 minutes)
1000 threads -> 464 seconds -> 27 requests per second
100 threads took 1000 seconds -> 12 requests per second
# the password is in line 460
100 threads took 32 seconds -> 14 requests per second
1000 threads took 16 seconds -> 28 requests per second
64 threads took 51 seconds -> 9 requests per second (hydra took the same time)
# word number 20k in rockyou
1100 threads took 637 seconds which means 31 rps
110 threads took 1457 seconds so that’s 13.7 rps

Uses a custom implementation of paramiko to overcome a few minor issues with implementing it for ssh brute forcing. – https://github.com/paramiko/paramiko/

R K

Recent Posts

Kali Linux 2024.4 Released, What’s New?

Kali Linux 2024.4, the final release of 2024, brings a wide range of updates and…

10 hours ago

Lifetime-Amsi-EtwPatch : Disabling PowerShell’s AMSI And ETW Protections

This Go program applies a lifetime patch to PowerShell to disable ETW (Event Tracing for…

10 hours ago

GPOHunter – Active Directory Group Policy Security Analyzer

GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory…

2 days ago

2024 MITRE ATT&CK Evaluation Results – Cynet Became a Leader With 100% Detection & Protection

Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders…

5 days ago

SecHub : Streamlining Security Across Software Development Lifecycles

The free and open-source security platform SecHub, provides a central API to test software with…

1 week ago

Hawker : The Comprehensive OSINT Toolkit For Cybersecurity Professionals

Don't worry if there are any bugs in the tool, we will try to fix…

1 week ago