A Python script to connect to a Metasploitable machine using SSH and FTP protocols. This tool allows users to execute commands interactively over SSH and manage files via FTP.
-
SSH Connection:
- Connect to a Metasploitable machine using SSH credentials.
- Execute commands interactively in a shell environment.
-
FTP Connection:
- Connect to the Metasploitable machine using FTP credentials.
- List files in the current directory.
- (Optional) Download files from the server.
- Python 3.x
- Paramiko library
-
Clone the Repository
git clone https://github.com/yourusername/metasploitable-connector.git cd metasploitable-connector
-
Install Dependencies
pip install paramiko
-
Configure Credentials
Update the script with your SSH and FTP credentials:
SSH_USERNAME = 'your_ssh_username' SSH_PASSWORD = 'your_ssh_password' FTP_USERNAME = 'your_ftp_username' FTP_PASSWORD = 'your_ftp_password'
-
Run the Script
python connector.py
-
Follow the Prompts
- Enter the IP address of the Metasploitable machine.
- Specify the port number (default: 22 for SSH, 21 for FTP).
- Choose the connection type (SSH or FTP).
Warning: Storing credentials in plain text is insecure. Consider using environment variables or a secure credential manager for sensitive information.
Contributions are welcome! Please open an issue or submit a pull request for any improvements or bug fixes.
This project is licensed under the MIT License.
Disclaimer: Use this tool responsibly and only on networks and systems you have permission to test.