Home

Awesome

0x00 Oneshellcrack

oneshellcrack 是一个非常快的webshell暴力破解工具,工作原理是多线程并通过一次性发送大量的密码探测POST数据进行爆破,是其他普通webshell密码暴力破解工具的数千倍

项目地址:https://github.com/L-codes/oneshellcrack

0x01 Features

0x02 Parameter description

$ python3 oneshellcrack.py -h

  ___             ____  _          _ _  ____                _    
 / _ \ _ __   ___/ ___|| |__   ___| | |/ ___|_ __ __ _  ___| | __
| | | | '_ \ / _ \___ \| '_ \ / _ \ | | |   | '__/ _` |/ __| |/ /
| |_| | | | |  __/___) | | | |  __/ | | |___| | | (_| | (__|   < 
 \___/|_| |_|\___|____/|_| |_|\___|_|_|\____|_|  \__,_|\___|_|\_\                                                           

               [ Author L       Version 1.0.1 ]

[ Github ] https://github.com/L-codes/oneshellcrack

usage: oneshellcrack.py [-h] [-m] [-n] [-r] [-s] [-t] [-w]
                        [-p FILE [FILE ...]]
                        URL

positional arguments:
  URL                  Target URL

optional arguments:
  -h, --help           show this help message and exit
  -m , --max-threads   specify max threads [default: 200]
  -n , --number        specify max password request [default: auto]
  -r , --retry-nums    specify max retry request [default: 1]
  -s , --shell         specify webshell type
  -t , --timeout       specify request timeout [default: 8]
  -w , --weakpwd-len   specify weak possword lenghts [default: 4]
  -p FILE [FILE ...]   specify possword files [default: Weak passwords]

use examples:
  python oneshellcrack.py http://localhost/shell.php 
  python oneshellcrack.py http://localhost/shell.jsp -n 1000 -m 300
  python oneshellcrack.py http://localhost/shell.asp -p pwd1.lst pwd2.lst

0x03 Use examples

Examples 1

python3 oneshellcrack.py http://172.16.178.139/a.php     
  ___             ____  _          _ _  ____                _    
 / _ \ _ __   ___/ ___|| |__   ___| | |/ ___|_ __ __ _  ___| | __
| | | | '_ \ / _ \___ \| '_ \ / _ \ | | |   | '__/ _` |/ __| |/ /
| |_| | | | |  __/___) | | | |  __/ | | |___| | | (_| | (__|   < 
 \___/|_| |_|\___|____/|_| |_|\___|_|_|\____|_|  \__,_|\___|_|\_\                                                           

               [ Author L       Version 1.0.1 ]

[ Github ] https://github.com/L-codes/oneshellcrack

 ( Shell:php, Numbers:1500, Threads:200, Retry:1 )

[Crack] No.1751 (0.01s) CODE: 200 - POST Content-Length: 15623                    

[Failed] No password found
[Finish] 2626500 words in 11.922 seconds. (220310 w/s)

Examples 2

$ python3 oneshellcrack.py http://172.16.178.133:84/1.asp -p pwd.lst
  ___             ____  _          _ _  ____                _    
 / _ \ _ __   ___/ ___|| |__   ___| | |/ ___|_ __ __ _  ___| | __
| | | | '_ \ / _ \___ \| '_ \ / _ \ | | |   | '__/ _` |/ __| |/ /
| |_| | | | |  __/___) | | | |  __/ | | |___| | | (_| | (__|   < 
 \___/|_| |_|\___|____/|_| |_|\___|_|_|\____|_|  \__,_|\___|_|\_\                                                           

               [ Author L       Version 1.0.1 ]

[ Github ] https://github.com/L-codes/oneshellcrack

 ( Shell:asp, Numbers:1000, Threads:200, Retry:1 )

[Crack] No.607  (0.05s) CODE: 200 - POST Content-Length: 41347                    

[Success] Password: pass&123
[Finish] 607000 words in 5.080 seconds. (119477 w/s)

0x04 Problem

如在使用过程中发现bug或有好的建议,欢迎提交IssuesPull Requests