Skip to content

Scans a list of IP addresses for weak SSH algorithms and vulnerabilities related to the SWEET32 attack.

Notifications You must be signed in to change notification settings

marmuthandsome/WeakSweet

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 

Repository files navigation

WEAKSWEET

WEAKSWEET Checker is a Bash script that scans a list of IP addresses for weak SSH algorithms and vulnerabilities related to the SWEET32 attack. It provides a comprehensive report of the scan results.

Table of Contents

Installation

  1. Clone the repository or download the Bash script (weaksweet.sh) to your local machine:
git clone https://github.com/nieshakenzie/WeakSweet.git
  1. Go to directory WeakSweet:
cd WeakSweet
  1. Make the script executable:
chmod +x weaksweet.sh

Usage

To scan a list of IP addresses for weak SSH algorithms and SWEET32 vulnerabilities, use the following command:

./weaksweet.sh -i input_file.txt -o output_file.txt

Replace input_file.txt with the path to your input file containing a list of IP addresses.

Replace output_file.txt with the desired name of the output file where the scan results will be saved.

Options

-h: Display the help message, which includes usage instructions and available options.

-i input_file: Specify the input file containing a list of IP addresses to scan. Each IP address should be on a separate line in the file.

-o output_file: Specify the output file where the scan results will be saved. If not specified, the default output file is output.txt.

Sample Output

Here is an example of the output format generated by WEAKSWEET Checker:

IP Address      | Port Status        | Scan Result
---------------------------------------------------------
192.168.1.0   | open               | Vulnerable to SSH Weak Key Exchange
192.168.1.1   | open               | No vulnerabilities
192.168.1.2   | closed             | Filtered or Closed

Output File Saved on output.txt

Weak Sweet32


About

Scans a list of IP addresses for weak SSH algorithms and vulnerabilities related to the SWEET32 attack.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages