Cerbrutus : Network Brute Force Tool, Written In Python

Cerbrutus is a Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services.

COMING SOON: SMB, HTTP(s) POST, HTTP(s) GET, HTTP BASIC AUTH Thanks to @0dayctf, Rondons, Enigma, and 001 for testing and contributing

Installation

cd /opt
git clone https://github.com/Cerbrutus-BruteForcer/cerbrutus

Usage

python3 /opt/cerbrutus/cerbrutus.py –help
usage: cerbrutus.py [-h] -U USERS -P PASSWORDS [-p PORT] [-t THREADS] [-q [QUIET [QUIET …]]] Host Service
Python based network brute forcing tool!
positional arguments:
Host The host to connect to – in IP or VHOST/Domain Name form
Service The service to brute force (currently implemented ‘SSH’)
optional arguments:
-h, –help show this help message and exit
-U USERS, –users USERS
Either a single user, or the path to the file of users you wish to use
-P PASSWORDS, –passwords PASSWORDS
Either a single password, or the path to the password list you wish to use
-p PORT, –port PORT The port you wish to target (only required if running on a non standard port)
-t THREADS, –threads THREADS
Number of threads to use
-q [QUIET [QUIET …]], –quiet [QUIET [QUIET …]]
Do not print banner

/opt/cerbrutus/cerbrutus.py 10.10.10.10 SSH -U “username” -P /opt/wordlists/fasttrack.txt -t 10
================================================================
_ _ _ _ _
/ ] / ]| \ | \ | | | || || | |/ /
/ / / [
| D )| o )| D ) | || || | ( _
/ / | ]| / | || /| | ||| ||| | |_ |
/ _ | [_ | \ | O || | : | | | | : |/ \ |
\ || || . | || . \ | | | | |\ |
____|||||_|||||_|__,| || _,_| _|
Network Brute Force Tool
https://github.com/Cerbrutus-BruteForcer/cerbrutus
================================================================
[] – Initialising password list… Read in 224 words from /opt/wordlists/fasttrack.txt [+] – Running with 10 threads… [] – Starting attack against username@10.10.10.10
[*] – Trying: 65/224

Test Run

# The password is in line number 12600 in rockyou
64 threads -> 1400 seconds ~ 7 minutes (hydra took 30 minutes)
1000 threads -> 464 seconds -> 27 requests per second
100 threads took 1000 seconds -> 12 requests per second
# the password is in line 460
100 threads took 32 seconds -> 14 requests per second
1000 threads took 16 seconds -> 28 requests per second
64 threads took 51 seconds -> 9 requests per second (hydra took the same time)
# word number 20k in rockyou
1100 threads took 637 seconds which means 31 rps
110 threads took 1457 seconds so that’s 13.7 rps

Uses a custom implementation of paramiko to overcome a few minor issues with implementing it for ssh brute forcing. – https://github.com/paramiko/paramiko/

R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago