mirror of
https://github.com/mgeeky/Penetration-Testing-Tools.git
synced 2025-09-05 19:42:58 +02:00
updates
This commit is contained in:
@ -8,7 +8,7 @@
|
||||
# Python requirements:
|
||||
# - scapy
|
||||
#
|
||||
# Mariusz B. / mgeeky, '18, <mb@binary-offensive.com>
|
||||
# Mariusz Banach / mgeeky, '18, <mb@binary-offensive.com>
|
||||
#
|
||||
|
||||
import sys
|
||||
@ -202,7 +202,7 @@ def parseOptions(argv):
|
||||
print('''
|
||||
:: CDP Flooding / Denial of Service tool
|
||||
Floods the interface with fake, randomly generated CDP packets.
|
||||
Mariusz B. / mgeeky '18, <mb@binary-offensive.com>
|
||||
Mariusz Banach / mgeeky '18, <mb@binary-offensive.com>
|
||||
v{}
|
||||
'''.format(VERSION))
|
||||
|
||||
|
@ -6,7 +6,7 @@
|
||||
# Python requirements:
|
||||
# - scapy
|
||||
#
|
||||
# Mariusz B. / mgeeky, '18, <mb@binary-offensive.com>
|
||||
# Mariusz Banach / mgeeky, '18, <mb@binary-offensive.com>
|
||||
#
|
||||
|
||||
import sys
|
||||
@ -122,7 +122,7 @@ def parseOptions(argv):
|
||||
print('''
|
||||
:: HSRP Flooding / Denial of Service tool
|
||||
Floods the interface with Active router Coup HSRP packets.
|
||||
Mariusz B. / mgeeky '18, <mb@binary-offensive.com>
|
||||
Mariusz Banach / mgeeky '18, <mb@binary-offensive.com>
|
||||
v{}
|
||||
'''.format(VERSION))
|
||||
|
||||
|
@ -33,7 +33,7 @@ PS D:\> python3 .\exchangeRecon.py 10.10.10.9
|
||||
|
||||
:: Exchange Fingerprinter
|
||||
Tries to obtain internal IP address, Domain name and other clues by talking to Exchange
|
||||
Mariusz B. / mgeeky '19, <mb@binary-offensive.com>
|
||||
Mariusz Banach / mgeeky '19, <mb@binary-offensive.com>
|
||||
v0.2
|
||||
|
||||
[.] Probing for Exchange fingerprints...
|
||||
@ -141,7 +141,7 @@ bash $ python RoutingAttackKit.py
|
||||
|
||||
:: Routing Protocols Exploitation toolkit
|
||||
Sends out various routing protocols management frames
|
||||
Mariusz B. / mgeeky '19, <mb@binary-offensive.com>
|
||||
Mariusz Banach / mgeeky '19, <mb@binary-offensive.com>
|
||||
v0.1
|
||||
|
||||
Available attacks:
|
||||
@ -157,7 +157,7 @@ bash # python RoutingAttackKit.py -t rip-fuzzer -v
|
||||
|
||||
:: Routing Protocols Exploitation toolkit
|
||||
Sends out various routing protocols management frames
|
||||
Mariusz B. / mgeeky '19, <mb@binary-offensive.com>
|
||||
Mariusz Banach / mgeeky '19, <mb@binary-offensive.com>
|
||||
v0.1
|
||||
|
||||
[.] Using 192.168.1.14 as local/spoof IP address
|
||||
@ -241,7 +241,7 @@ $ ./VLANHopperDTP.py --help
|
||||
|
||||
:: VLAN Hopping via DTP Trunk negotiation
|
||||
Performs VLAN Hopping via negotiated DTP Trunk / Switch Spoofing technique
|
||||
Mariusz B. / mgeeky, '18
|
||||
Mariusz Banach / mgeeky, '18
|
||||
v0.3
|
||||
|
||||
usage: ./VLANHopperDTP.py [options]
|
||||
@ -279,7 +279,7 @@ $ sudo ./VLANHopperDTP.py -i enp5s0f1
|
||||
|
||||
:: VLAN Hopping via DTP Trunk negotiation
|
||||
Performs VLAN Hopping via negotiated DTP Trunk / Switch Spoofing technique
|
||||
Mariusz B. / mgeeky, '18
|
||||
Mariusz Banach / mgeeky, '18
|
||||
v0.2
|
||||
|
||||
[+] VLAN Hopping IS possible.
|
||||
|
@ -13,7 +13,7 @@
|
||||
# Python requirements:
|
||||
# - scapy
|
||||
#
|
||||
# Mariusz B. / mgeeky, '19, <mb@binary-offensive.com>
|
||||
# Mariusz Banach / mgeeky, '19, <mb@binary-offensive.com>
|
||||
#
|
||||
|
||||
import sys
|
||||
@ -618,7 +618,7 @@ def parseOptions(argv):
|
||||
print('''
|
||||
:: Routing Protocols Exploitation toolkit
|
||||
Sends out various routing protocols management frames
|
||||
Mariusz B. / mgeeky '19, <mb@binary-offensive.com>
|
||||
Mariusz Banach / mgeeky '19, <mb@binary-offensive.com>
|
||||
v{}
|
||||
'''.format(VERSION))
|
||||
|
||||
|
@ -39,7 +39,7 @@
|
||||
# - Add auto-packets capture functionality via tshark/tcpdump to specified out directory
|
||||
# - Add functionality to auto-scan via arp-scan desired network
|
||||
#
|
||||
# Mariusz B. / mgeeky, '18-19, <mb@binary-offensive.com>
|
||||
# Mariusz Banach / mgeeky, '18-19, <mb@binary-offensive.com>
|
||||
#
|
||||
|
||||
import os
|
||||
@ -724,7 +724,7 @@ def parseOptions(argv):
|
||||
print('''
|
||||
:: VLAN Hopping via DTP Trunk negotiation
|
||||
Performs VLAN Hopping via negotiated DTP Trunk / Switch Spoofing technique
|
||||
Mariusz B. / mgeeky '18-19, <mb@binary-offensive.com>
|
||||
Mariusz Banach / mgeeky '18-19, <mb@binary-offensive.com>
|
||||
v{}
|
||||
'''.format(VERSION))
|
||||
|
||||
|
@ -5,7 +5,7 @@
|
||||
# the switch's port. This reconessaince will be helpful for performing
|
||||
# VLAN Hopping attacks.
|
||||
#
|
||||
# Mariusz B. / mgeeky, '18
|
||||
# Mariusz Banach / mgeeky, '18
|
||||
#
|
||||
|
||||
import os
|
||||
|
@ -32,7 +32,7 @@
|
||||
# - packaging
|
||||
#
|
||||
# Author:
|
||||
# Mariusz B. / mgeeky, '19, <mb@binary-offensive.com>
|
||||
# Mariusz Banach / mgeeky, '19, <mb@binary-offensive.com>
|
||||
#
|
||||
|
||||
import re
|
||||
@ -1300,7 +1300,7 @@ def parseOptions(argv):
|
||||
print('''
|
||||
:: Exchange Fingerprinter
|
||||
Tries to obtain internal IP address, Domain name and other clues by talking to Exchange
|
||||
Mariusz B. / mgeeky '19, <mb@binary-offensive.com>
|
||||
Mariusz Banach / mgeeky '19, <mb@binary-offensive.com>
|
||||
v{}
|
||||
'''.format(VERSION))
|
||||
|
||||
|
@ -6,7 +6,7 @@
|
||||
#
|
||||
# Based on "Black Hat Python" book by Justin Seitz.
|
||||
#
|
||||
# Mariusz B.
|
||||
# Mariusz Banach
|
||||
#
|
||||
|
||||
import os
|
||||
|
@ -51,7 +51,7 @@ if __name__ == '__main__':
|
||||
|
||||
print '\n\tMicrosoft IIS WebDAV Write Code Execution exploit'
|
||||
print '\t(based on Metasploit HDM\'s <iis_webdav_upload_asp> implementation)'
|
||||
print '\tMariusz B. / mgeeky, 2016\n'
|
||||
print '\tMariusz Banach / mgeeky, 2016\n'
|
||||
|
||||
host = sys.argv[1]
|
||||
if not host.startswith('http'):
|
||||
|
@ -25,7 +25,7 @@
|
||||
# Requirements:
|
||||
# - paramiko
|
||||
#
|
||||
# Mariusz B. / mgeeky, <mb@binary-offensive.com>
|
||||
# Mariusz Banach / mgeeky, <mb@binary-offensive.com>
|
||||
#
|
||||
|
||||
import sys
|
||||
@ -360,7 +360,7 @@ def main():
|
||||
sys.stderr.write('''
|
||||
:: CVE-2018-10993 libSSH authentication bypass exploit.
|
||||
Tries to attack vulnerable libSSH libraries by accessing SSH server without prior authentication.
|
||||
Mariusz B. / mgeeky '18, <mb@binary-offensive.com>
|
||||
Mariusz Banach / mgeeky '18, <mb@binary-offensive.com>
|
||||
v{}
|
||||
|
||||
'''.format(VERSION))
|
||||
|
@ -5,7 +5,7 @@
|
||||
# configuration files in order to extract plain and cipher passwords out of them.
|
||||
# Equipped with functionality to decrypt Cisco Type 7 passwords.
|
||||
#
|
||||
# Mariusz B., mgeeky '18-20
|
||||
# Mariusz Banach, mgeeky '18-20
|
||||
#
|
||||
|
||||
import re
|
||||
@ -427,7 +427,7 @@ def printResults():
|
||||
def main(argv):
|
||||
Logger._out('''
|
||||
:: Network-configuration Credentials extraction script
|
||||
Mariusz B. / mgeeky, '18
|
||||
Mariusz Banach / mgeeky, '18
|
||||
''')
|
||||
opts = parseOptions(argv)
|
||||
if not opts:
|
||||
|
@ -72,7 +72,7 @@
|
||||
# - Microsoft Exchange Server 2013
|
||||
#
|
||||
# Author:
|
||||
# Mariusz B. / mgeeky, '17-19,
|
||||
# Mariusz Banach / mgeeky, '17-19,
|
||||
# <mb@binary-offensive.com>
|
||||
#
|
||||
|
||||
@ -2958,7 +2958,7 @@ Date: {dateNow}
|
||||
|
||||
smtpAudit.py ({VERSION}) - SMTP Server penetration testing / audit tool,
|
||||
(https://gist.github.com/mgeeky/ef49e5fb6c3479dd6a24eb90b53f9baa)
|
||||
by Mariusz B. / mgeeky (<mb@binary-offensive.com>)
|
||||
by Mariusz Banach / mgeeky (<mb@binary-offensive.com>)
|
||||
.
|
||||
'''
|
||||
|
||||
@ -3698,7 +3698,7 @@ class ParseOptions:
|
||||
def banner():
|
||||
sys.stderr.write('''
|
||||
:: SMTP Black-Box Audit tool.
|
||||
v{}, Mariusz B. / mgeeky, '17
|
||||
v{}, Mariusz Banach / mgeeky, '17
|
||||
|
||||
'''.format(VERSION))
|
||||
|
||||
@ -3828,7 +3828,7 @@ def main(argv):
|
||||
sys.stderr.write('''
|
||||
:: SMTP configuration Audit / Penetration-testing tool
|
||||
Intended to be used as a black-box tool revealing security state of SMTP.
|
||||
Mariusz B. / mgeeky, '17-19
|
||||
Mariusz Banach / mgeeky, '17-19
|
||||
v{}
|
||||
|
||||
'''.format(VERSION))
|
||||
|
@ -3,7 +3,7 @@
|
||||
# Simple script intended to abuse SMTP server's VRFY command to leak
|
||||
# usernames having accounts registered within it.
|
||||
#
|
||||
# Mariusz B., 2016
|
||||
# Mariusz Banach, 2016
|
||||
#
|
||||
|
||||
import socket
|
||||
|
@ -7,7 +7,7 @@
|
||||
# Nothing fancy, just set of needed commands. Especially handy when
|
||||
# used with `startEAPHammer.sh` script.
|
||||
#
|
||||
# Mariusz B. / mgeeky '18, <mb@binary-offensive.com>
|
||||
# Mariusz Banach / mgeeky '18, <mb@binary-offensive.com>
|
||||
#
|
||||
|
||||
if [ $# -ne 2 ]; then
|
||||
|
@ -5,7 +5,7 @@
|
||||
# that takes as input list of APs against which should deauth be launched,
|
||||
# and then attempts that attack.
|
||||
#
|
||||
# Mariusz B. / mgeeky '18, <mb@binary-offensive.com>
|
||||
# Mariusz Banach / mgeeky '18, <mb@binary-offensive.com>
|
||||
#
|
||||
|
||||
if [ $# -ne 1 ]; then
|
||||
|
@ -14,7 +14,7 @@
|
||||
# Especially handy when used with companion script called:
|
||||
# `initDHCPServer.sh`
|
||||
#
|
||||
# Mariusz B. / mgeeky '18, <mb@binary-offensive.com>
|
||||
# Mariusz Banach / mgeeky '18, <mb@binary-offensive.com>
|
||||
#
|
||||
|
||||
####################################################################
|
||||
|
Reference in New Issue
Block a user