Skip to content

captain-woof/redis-rce-ssh

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Introduction

This tool bruteforces user home directories on a Redis server, and tries to overwrite "authorized_keys" in discovered users' SSH directories.

Upon success, you can SSH in as the user via the associated private SSH key.

Read more.

Usage

usage: main.py [-h] [-H HOST] [-P PORT] [-p PASSWORD] [-n DATABASE] [-w USERNAMES] [--public PUBLIC] [-d DIR]

options:
  -h, --help            show this help message and exit
  -H HOST, --host HOST  Target Redis server's IP address; default: 127.0.0.1
  -P PORT, --port PORT  Target Redis server's port; default: 6379
  -p PASSWORD, --password PASSWORD
                        Login password; default: ''
  -n DATABASE, --database DATABASE
                        DB number; default: 0
  -w USERNAMES, --usernames USERNAMES
                        Usernames wordlist to use for bruteforcing
  --public PUBLIC       The public SSH key to overwrite; use 'ssh-keygen' to generate the key pair
  -d DIR, --dir DIR     User SSH directory format; must contain 'USER' placeholder; default: '/home/USER/.ssh'

About

Bruteforce user SSH directories on Redis servers and overwrite authorized_keys

Topics

Resources

Stars

Watchers

Forks

Languages