SSHnuke exploit SSHv1 CRC32







 # nmap -O 10.2.2.2
 Port       State       Service
 22/tcp     open        ssh
 No exact OS matches for host
 nmap run completed -- 1 IP address (1 host up) scanneds

 # sshnuke 10.2.2.2 -rootpw="Z10N0101"
 connecting to 10.2.2.2:ssh ... successful.
 attempting to exploit SSHv1 CRC32 ... successful.
 reseting root password to "Z10N0101".
 system open: Access Level <9>
 # ssh 10.2.2.2 -l root
 root@10.2.2.2's password:

 RTF-CONTROL> disable grid nodes 21 - 48
 Warning: Disabling nodes 21-48 will disconnect sector 11 (27 nodes)

  ARE YOU SURE? (y/n) y

  Grid Node 21 offline...
  Grid Node 22 offline...
  Grid Node 23 offline...
  Grid Node 24 offline...
  Grid Node 25 offline...
  Grid Node 26 offline...
  Grid Node 27 offline...
  Grid Node 28 offline...
  Grid Node 29 offline...
  Grid Node 30 offline...
  Grid Node 31 offline...
  Grid Node 32 offline...
  Grid Node 33 offline...
  Grid Node 34 offline...
  Grid Node 35 offline...
  Grid Node 36 offline...
  Grid Node 37 offline...
  Grid Node 38 offline...
  Grid Node 39 offline...
  Grid Node 40 offline...
  Grid Node 41 offline...
  Grid Node 42 offline...
  Grid Node 43 offline...
  Grid Node 43 offline...
  Grid Node 44 offline...
  Grid Node 45 offline...
  Grid Node 46 offline...
  Grid Node 47 offline...
  Grid Node 48 offline...

 RTF-CONTROL> 
1