// crack passwd func Crack(host_info HostInfo, chan_scan_result chan HostInfo) { host := host_info.host port := host_info.port user := host_info.user passwd := host_info.pass is_ok := host_info.is_weak config := &ssh.ClientConfig{ User: user, Auth: []ssh.AuthMethod{ ssh.Password(passwd), }, } client, err := ssh.Dial("tcp", host+":"+port, config) if err != nil { is_ok = false // panic("Failed to dial: " + err.Error()) } else { session, err := client.NewSession() defer session.Close() if err != nil { is_ok = false } else { is_ok = true } } host_info.is_weak = is_ok chan_scan_result <- host_info }
// crack passwd func Crack(host, port, user, passwd string) (is_ok bool, result string) { config := &ssh.ClientConfig{ User: user, Auth: []ssh.AuthMethod{ ssh.Password(passwd), }, } client, err := ssh.Dial("tcp", host+":"+port, config) if err != nil { panic("Failed to dial: " + err.Error()) } // Each ClientConn can support multiple interactive sessions, // represented by a Session. session, err := client.NewSession() if err != nil { is_ok = false panic("Failed to create session: " + err.Error()) } is_ok = true defer session.Close() // Once a Session is created, you can execute a single command on // the remote side using the Run method. var b bytes.Buffer session.Stdout = &b if err := session.Run("/usr/bin/whoami"); err != nil { result = "" panic("Failed to run: " + err.Error()) } result = b.String() return is_ok, result }
func ExampleSession_RequestPty() { // Create client config config := &ssh.ClientConfig{ User: "******", Auth: []ssh.AuthMethod{ ssh.Password("password"), }, } // Connect to ssh server conn, err := ssh.Dial("tcp", "localhost:22", config) if err != nil { log.Fatalf("unable to connect: %s", err) } defer conn.Close() // Create a session session, err := conn.NewSession() if err != nil { log.Fatalf("unable to create session: %s", err) } defer session.Close() // Set up terminal modes modes := ssh.TerminalModes{ ssh.ECHO: 0, // disable echoing ssh.TTY_OP_ISPEED: 14400, // input speed = 14.4kbaud ssh.TTY_OP_OSPEED: 14400, // output speed = 14.4kbaud } // Request pseudo terminal if err := session.RequestPty("xterm", 80, 40, modes); err != nil { log.Fatalf("request for pseudo terminal failed: %s", err) } // Start remote shell if err := session.Shell(); err != nil { log.Fatalf("failed to start shell: %s", err) } }
func ExampleClient_Listen() { config := &ssh.ClientConfig{ User: "******", Auth: []ssh.AuthMethod{ ssh.Password("password"), }, } // Dial your ssh server. conn, err := ssh.Dial("tcp", "localhost:22", config) if err != nil { log.Fatalf("unable to connect: %s", err) } defer conn.Close() // Request the remote side to open port 8080 on all interfaces. l, err := conn.Listen("tcp", "0.0.0.0:8080") if err != nil { log.Fatalf("unable to register tcp forward: %v", err) } defer l.Close() // Serve HTTP with your SSH server acting as a reverse proxy. http.Serve(l, http.HandlerFunc(func(resp http.ResponseWriter, req *http.Request) { fmt.Fprintf(resp, "Hello world!\n") })) }
func ExampleDial() { // An SSH client is represented with a ClientConn. Currently only // the "password" authentication method is supported. // // To authenticate with the remote server you must pass at least one // implementation of AuthMethod via the Auth field in ClientConfig. config := &ssh.ClientConfig{ User: "******", Auth: []ssh.AuthMethod{ ssh.Password("yourpassword"), }, } client, err := ssh.Dial("tcp", "yourserver.com:22", config) if err != nil { panic("Failed to dial: " + err.Error()) } // Each ClientConn can support multiple interactive sessions, // represented by a Session. session, err := client.NewSession() if err != nil { panic("Failed to create session: " + err.Error()) } defer session.Close() // Once a Session is created, you can execute a single command on // the remote side using the Run method. var b bytes.Buffer session.Stdout = &b if err := session.Run("/usr/bin/whoami"); err != nil { panic("Failed to run: " + err.Error()) } fmt.Println(b.String()) }
// crack passwd func Crack(host, port, user, passwd string) (is_ok bool) { config := &ssh.ClientConfig{ User: user, Auth: []ssh.AuthMethod{ ssh.Password(passwd), }, } _, err := ssh.Dial("tcp", host+":"+port, config) if err != nil { is_ok = false // panic("Failed to dial: " + err.Error()) } is_ok = true return is_ok }
// crack passwd func Crack(host, port, user, passwd, newpasswd string) (is_ok bool, result string) { config := &ssh.ClientConfig{ User: user, Auth: []ssh.AuthMethod{ ssh.Password(passwd), }, } client, err := ssh.Dial("tcp", host+":"+port, config) if err != nil { result = "Failed to dial: " + err.Error() glog.Errorf("%s\n", result) return is_ok, result } // Each ClientConn can support multiple interactive sessions, // represented by a Session. session, err := client.NewSession() if err != nil { result = "Failed to create session: " + err.Error() glog.Errorf("%s\n", result) return is_ok, result } defer session.Close() // Once a Session is created, you can execute a single command on // the remote side using the Run method. var b bytes.Buffer session.Stdout = &b cmd := fmt.Sprintf("/bin/echo \"%s:%s\" | /usr/sbin/chpasswd", user, newpasswd) // fmt.Println(cmd) if err := session.Run(cmd); err != nil { result = "Failed to run: " + err.Error() glog.Errorf("%s\n", result) } else { is_ok = true result = b.String() } return is_ok, result }