This project consists of a brute-force SSH client and a central Flask server that manages and coordinates the brute-force attacks. The client attempts to guess passwords for SSH logins on remote servers, while the Flask server tracks progress, logs results, and provides new targets.
-
Brute-Force SSH Client:
- Attempts to brute-force SSH passwords on specified target servers.
- Periodically checks for updates from a GitHub repository.
- Sends results, errors, timeouts, and banned IPs to the Flask server.
-
Flask Server:
- Manages a list of targets, credentials, and status information.
- Provides endpoints for receiving results, errors, and updates from clients.
- Tracks IP ranges and determines the next target IP address.
- Python 3.6+
- Flask
- Paramiko
- Requests
-
Clone the Repository
git clone https://github.com/botsarefuture/ukrainetowin.git cd ukrainetowin
-
Install Dependencies
Install the required Python packages for both the client and server:
pip install -r requirements.txt
Create a
requirements.txt
file with the following content:Flask==2.1.1 paramiko==2.11.0 requests==2.28.1
-
Flask Server Configuration
- Modify the
info.json
file to configure IP ranges, and initial data if needed. - Update
info.json
with valid ranges and initial settings.
- Modify the
-
Client Configuration
- Update the client script to include the correct GitHub repository URL and API base URL for the Flask server.
-
Start the Flask server:
python server.py
The server will run on
http://0.0.0.0:5000
by default.
-
Start the client script:
python client.py
The client will continuously attempt to brute-force passwords on targets provided by the Flask server.
GET /target
: Returns the next target IP address for the client.POST /error
: Receives and logs error information from clients.POST /result
: Receives and stores successful login results.POST /timeout
: Receives and logs timeout events from clients.POST /ban
: Receives and logs banned IP addresses from clients.
- Start the Flask server to manage targets and receive data from clients.
- Run the client script to start the brute-force attacks.
- The client will request new target IPs from the server and report its progress.
This project is licensed under the MIT License. See the LICENSE file for details.
This project is intended for educational purposes only. Unauthorized access to computer systems is illegal and unethical. Use this software responsibly and only on systems you have explicit permission to test.
For questions or issues, please contact [email protected].