GET YOUR VULNERABILITY AND THREAT DATABASE SUBSCRIPTION
EKOLABS 2016


Tools no image

Published on July 14th, 2014 | by MaxiSoler

1

[New Tool] OSUETA v0.8 OpenSSH User Enumeration Timing Attack Released

OSUETA stands for OpenSSH User Enumeration Timing Attack and is a small script written in Python to exploit a bug present in versions 5 . * and 6. * of OpenSSH . In these versions during the authentication process, you may obtain a list of users in the system discriminated by the time it takes the system to evaluate an arbitrarily long password.

If the user is present, the time it takes the server to respond is larger. For example, to allow users found present in a system , this tool can be useful in penetration testing to shorten in brute force. The script also has the ability to establish a Denial of Service attack in the ssh service.

 

Usage:
osueta.py [-h] [-H HOST] [-k HFILE] [-f FQDN] [-p PORT] [-L UFILE]
 [-U USER] [-d DELAY] [-v VARI] [-o OUTP] [-l LENGTH]
 [-c VERS] [--dos DOS] [-t THREADS]
OpenSSH User Enumeration Time-Based Attack Python script
optional arguments:
-h, --help show this help message and exit
-H HOST Host Ip or CIDR netblock.
-k HFILE Host list in a file.
-f FQDN FQDN to attack.
-p PORT Host port.
-L UFILE Username list file.
-U USER Only use a single username.
-d DELAY Time delay fixed in seconds. If not, delay time is calculated.
-v VARI Make variations of the username (default yes).
-o OUTP Output file with positive results.
-l LENGTH Length of the password in characters (x1000) (default 40).
-c VERS Check or not the OpenSSH version (default yes).
--dos DOS Try to make a DOS attack (default no).
-t THREADS Threads for the DOS attack (default 5).

 

Download OSUETA v0.8

Thanks to our friend c0r3dump3d, for sharing this tool with us. 😉

Tags: , , , ,


About the Author

ToolsWatcher :) @maxisoler



One Response to [New Tool] OSUETA v0.8 OpenSSH User Enumeration Timing Attack Released

  1. Pingback: Security News #0x79 | CyberOperations

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to Top ↑