commands.sh

nxc ssh

all

Pentest and exploit SSH servers. See also: `hydra`.

More info →

Options (2)

-u, --usernameboolean

Spray the specified password against a list of usernames on the specified target

Example: nxc ssh {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{password}}
-p, --passwordboolean

Spray the specified password against a list of usernames on the specified target

Example: nxc ssh {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{password}}

Examples (5)

Spray the specified password against a list of usernames on the specified target

nxc ssh 192.168.178.2 [-u|--username] path/to/usernames.txt [-p|--password] password

Search for valid credentials by trying out every combination in the specified lists of usernames and passwords

nxc ssh 192.168.178.2 [-u|--username] path/to/usernames.txt [-p|--password] path/to/passwords.txt

Use the specified private key for authentication, using the supplied password as the key's passphrase

nxc ssh 192.186.178.2 [-u|--username] path/to/usernames.txt [-p|--password] password --key-file path/to/id_rsa

Try a combination of username and password on a number of targets

nxc ssh 192.168.178.0/24 [-u|--username] username [-p|--password] password

Check for `sudo` privileges on a successful login

nxc ssh 192.168.178.2 [-u|--username] username [-p|--password] path/to/passwords.txt --sudo-check
made by @shridhargupta | data from tldr-pages