A framework made to automate tasks of pentesting. Written in python 2.7
Screenshots
Install
git clone https://github.com/3XPL017/netpwn.git
cd netpwn
chmod +x install
./install
https://twitter.com/3XPL017GH057
git clone https://github.com/3XPL017/netpwn.git
cd netpwn
chmod +x install
./install
# Clone this repository
git clone https://github.com/trimstray/sandmap
# Go into the repository
cd sandmap
# Install
./setup.sh install
# Run the app
sandmap
- symlink to
bin/sandmap
is placed in/usr/local/bin
- man page is placed in
/usr/local/man/man8
etc/main.cfg
configuration file has the following structure:# shellcheck shell=bash
# Specifies the default destination.
# Examples:
# - dest="127.0.0.1,8.8.8.8"
dest="127.0.0.1"
# Specifies the extended Nmap parameters.
# Examples:
# - params="--script ssl-ccs-injection -p 443"
params=""
# Specifies the default output type and path.
# Examples:
# - report="xml"
report=""
# Specifies the TOR connection.
# Examples:
# - tor="true"
tor=""
# Specifies the terminal type.
# Examples:
# - terminal="internal"
terminal="internal"
log/
directory is created and in it the following files with logs:<script_name>.<date>.log
- all _logger()
function calls are saved in itstdout.log
- a standard output and errors from the _init_cmd()
function are written in it. If you want to redirect the output from command, use the following structure: your_command >>"$_log_stdout" 2>&1 &
|-- LICENSE.md # GNU GENERAL PUBLIC LICENSE, Version 3, 29 June 2007
|-- README.md # this simple documentation
|-- CONTRIBUTING.md # principles of project support
|-- .gitignore # ignore untracked files
|-- .travis.yml # continuous integration with Travis CI
|-- setup.sh # install sandmap on the system
|-- bin
|-- sandmap # main script (init)
|-- doc # includes documentation, images and manuals
|-- man8
|-- sandmap.8 # man page for sandmap
|-- img # images (eg. gif)
|-- etc # contains configuration files
|-- lib # libraries, external functions
|-- log # contains logs, created after init
|-- modules # contains modules
|-- src # includes external project files
|-- helpers # contains core functions
|-- import # appends the contents of the lib directory
|-- __init__ # contains the __main__ function
|-- settings # contains sandmap settings
|-- templates # contains examples and template files
|-- tmp # contains temporary files (mktemp)
This is the quickest way to get a running instance of Juice Shop! If you have forked this repository, the deploy button will automatically pick up your fork for deployment! As long as you do not perform any DDoS attacks you are free to use any tools or scripts to hack your Juice Shop instance on Heroku!
git clone https://github.com/bkimminich/juice-shop.git
(or clone your own fork of the repository)cd juice-shop
npm install
(only has to be done before first start or when you change the source code)npm start
docker pull bkimminich/juice-shop
docker run --rm -p 3000:3000 bkimminich/juice-shop
If you want to run Juice Shop on a Raspberry Pi 3, there is an unofficial Docker image available at https://hub.docker.com/r/arclight/juice-shop_arm which is based on resin/rpi-raspbian
and maintained by @battletux.
juice-shop
and click Create to download image and run containerjuice-shop-<version>_<node-version>_<os>_x64.zip
(or .tgz
) attached to latest releasenpm start
in unpacked folderEach packaged distribution includes some binaries for SQLite bound to the OS and node.js version which npm install
was executed on.
#!/bin/bash
yum update -y
yum install -y docker
service docker start
docker pull bkimminich/juice-shop
docker run -d -p 80:3000 bkimminich/juice-shop
Technically Amazon could view hacking activity on any EC2 instance as an attack on their AWS infrastructure! We highly discourage aggressive scanning or automated brute force attacks! You have been warned!
az group create --name <group name> --location <location name, e.g. "East US">
az appservice plan create --name <plan name> --resource-group <group name> --sku S1 --is-linux
az webapp create --resource-group <group name> --plan <plan name>
--name <app name> --deployment-container-image-name bkimminich/juice-shop
For more information please refer to the detailed walkthrough with screenshots by @JasonHaley. You can alternatively follow his guide to set up OWASP Juice Shop as an Azure Container Instance.
git clone https://github.com/bkimminich/juice-shop.git
(or clone your own fork of the repository)cd vagrant && vagrant up
To show the possible impact of XSS, assume you received and (of course) clicked this inconspicuous phishing link and login. Apart from the visual/audible effect, the attacker also installed an input logger to grab credentials! This could easily run on a 3rd party server in real life!
This feature is only available when running a Vagrant box. A recording of the effect is available on Youtube:
node.js | Docker image | Packaged distributions |
---|---|---|
9.x | latest (current official release), snapshot (preview from develop branch) | juice-shop-<version>_node9_windows_x64.zip , juice-shop-<version>_node9_linux_x64.tgz |
8.x | juice-shop-<version>_node8_windows_x64.zip , juice-shop-<version>_node8_linux_x64.tgz |
This is a deployment-test and sneak-peek instance only! You are not supposed to use this instance for your own hacking endeavours! No guaranteed uptime! Guaranteed stern looks if you break it!
/config
, the OWASP Juice Shop can be customized in its content and look & feel.juice-shop-ctf-cli
tool.bkimminich
(Project Leader)J12934
wurstbrot
master
as of Wed, 14 Mar 2018CaptainFreak
m4l1c3
tghosth
madhurw7
omerlh
JlnWntr
Aashish683
g-k
ViktorLindstrm
ingben
aaron-m-edwards
evalsocket
gorkavicente
DinisCruz
JasonHaley
simbas
kfl
simondel
battletux
avidouglen
achimgrimm
cy4n
StuartWinterTear
ninoseki
abhishekbundela
incognitjoe
wayofthepie
johanna-a
alvarowolfx
(sshpass -p '123456' ssh -p 2222 root@192.168.1.66)
(ftp ftp://backup:b123@192.168.1.66:2121)
(rsync -avz -e 'ssh -p 2222' root@192.168.1.66:/var/db/backup.tar.gz /tmp/backup.tar.gz)
(scp -P 2222 root@192.168.1.66:/var/db/backup.tar.gz /tmp/backup.tar.gz)
(mysql -h 192.168.1.66 -P 3306 -u dbadmin -p12345 -e "show databases")
(wget http://192.168.1.66:8080/backup.zip)
(nano /tmp/backup/credentials.txt)
export AWS_ACCESS_KEY_ID=AKIAIOSFODNN7EXAMPLE
export AWS_SECRET_ACCESS_KEY=wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
aws ec2 describe-instances --profile devops --region us-east-2
go get github.com/spf13/viper
)go get github.com/xordataexchange/crypt/config
)$ go build
$ sudo ./honeybits
Failed reading remote config. Reading the local config file...
Local config file loaded.
[failed] honeyfile already exists at this path: /tmp/secret.txt
[done] go-audit rule for /home/test/secret.txt is added
[done] honeyfile is created (/home/test/secret.txt)
[done] go-audit rule for /opt/secret.txt is added
[done] sshpass honeybit is inserted
[done] wget honeybit is inserted
[done] ftp honeybit is inserted
[done] rsync honeybit is inserted
[done] scp honeybit is inserted
[done] mysql honeybit is inserted
[failed] aws honeybit already exists
[done] hostsconf honeybit is inserted
[done] awsconf honeybit is inserted
[done] awscred honeybit is inserted
[done] custom honeybit is inserted
forever start index.js
For the frontend, the file "index.html" can be hosted on the webserver of your choice. Make sure that the WebSocket URL points to your server.echo test12345 | python main.py -f- -d out -t-
Inside machinepython main.py -f- -d in -t TOKEN_THE_FIRST_COMMAND_GAVE_YOU
python main.py -f- -d in -t-
Inside machineecho test12345 | python main.py -f- -d out -t TOKEN_THE_FIRST_COMMAND_GAVE_YOU
git clone https://github.com/OWASP/iGoat-Swift.git
and open iGoat-Swift.xcodeproj with xcode.docker compose up
loader
), along with the output of Adam's plugin. This C program mmap
s (with the MAP_FIXED
flag) the memory mappings of Xorg into its own address space. In this way we recereate the address space of Xorg, ensuring that no reference between code and data is broken. The loader then calls a function (compGetImage
) contained in the Xorg code and saves the result to file. We identified this "magic" function by looking at how X serves a request for screenshot during normal usage. Fortunately, this function can always be found accurately since struct _Screen
contains a pointer to it.gcc -Wall -o loader loader.c
vol.py --plugins=$PWD/plugins/ --profile=XXX -f ./vbox.dmp linux_screenshot_xwindows --out-dir /tmp/xwds/
xwd
to png
:find /tmp/xwds/ -type f -name "*.xwd" -exec convert {} {}.png \;
$ apt-get install nodejs-legacy
$ pip install -r requirements.txt
python whoisleak.py -u securityattack.com.br
Eddy Oliveira
SecurityAttack
git branch --contains HEAD
[+] FILE_WITH_KEY.json (Open the Credentials tab and click Create credentials. You want the API key option. Create a server key. It will automatically download as a *.json file)
[+] KEY_FIREBASE_HERE (Open the Firebase Project and click Add Firebase to your web application)
[+] API_SHODAN_KEY
Now, we need to change index.html and firebase_conf.js files.[+] index.html - MY_KEY_MAP
[+] firebase_conf.js - Open the Firebase Project and click Add Firebase to your web application
Access index.html file and run "python fireshodan.py" to fill your database.
You can see your data now. If you remove any data your map will update automatic.
OBS: If you stop the script the data will continue there
heap_viewer.py
file and the heap_viewer
folder into IDA's plugin directory.libc6-dbg
package in the remotelinux machine and execute the script utils\get_config.py
. Then, paste the content in the heap_viewer\config.json
file.$ python get_config.py
[*] config.json:
{
"libc_offsets": {
"32": {
"mp_": 1921312,
"main_arena": 1922976,
},
"64": {
"mp_": 3883648,
"main_arena": 3886144,
}
},
"libc_version": "2.27"
}
If you not have the dbg symbols for given libc (ex: CTFs ;D), you can use the get_main_arena
tool, and get the main_arena offset for that libc. This is enough so the plugin works correctly. Simply put the main_arena offset in the config.json file.$ ./main_arena_offset
[*] libc version: 2.27
[*] libc file: /lib/i386-linux-gnu/libc-2.27.so
[*] libc address: 0xf7ceb000
[*] main_arena: 0xf7ec07a0
[*] main_arena offset: 0x1d57a0
$ LD_PRELOAD=./libc_64.so.6 ./main_arena_offset
...
Please note that ngrok is not not a necessity and is required only for performing over the internet (WAN) attack!
chmod +x Autopwn.sh
./Autopwn.sh
go get -v github.com/netevert/dnsmorph
cd /$GOPATH/src/github.com/netevert/dnsmorph
go get -v ./...
go build
dnsmorph -d domain | -l domains_file [-girv] [-csv | -json]
-csv
output to csv
-d string
target domain
-g geolocate domain
-i include subdomain
-json
output to json
-l string
domain list filepath
-r resolve domain
-v enable verbosity
./dnsmorph -d amazon.com
./dnsmorph -l domains.txt
./dnsmorph -d staging.amazon.com -i
./dnsmorph -d amazon.com -r
./dnsmorph -d amazon.com -g
./dnsmorph -d amazon.com -r -g -csv
./dnsmorph -d amazon.com -r -g -json
./dnsmorph -d staging.amazon.com -v
READER MODE: python airpydump.py -r [/path/to/.cap/file]
STEALTH MODE: python airpydump.py -i [Monitor Interface] --live
LIVE MODE: python airpydump.py -i [Monitor Interface] --live --curses
[usage] python airpydump.py [arguments]
-h, --help prints help manual
-i, --interface= Monitor Mode Interface to use
-r, --read= Read a captured file earlier, e.g. packets.cap
-w, --write= Write packets to a file.
-c, --curses Utilize curses library to print live packets
-i, --live Must be used for stealth and live modes
sudo apt update
sudo apt purge tomoyo-tools
sudo apt full-upgrade
sudo apt autoremove