Friday, August 28, 2020

Discover: A Custom Bash Scripts Used To Perform Pentesting Tasks With Metasploit


About discover: discover is a custom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit Framework. For use with Kali Linux, Parrot Security OS and the Penetration Testers Framework (PTF).

About authors:


discover Installation and Updating


About RECON in discover
   Domain

RECON

1. Passive

2. Active
3. Import names into an existing recon-ng workspace
4. Previous menu

   Passive uses ARIN, dnsrecon, goofile, goog-mail, goohost, theHarvester, Metasploit Framework, URLCrazy, Whois, multiple websites, and recon-ng.

   Active uses dnsrecon, WAF00W, traceroute, Whatweb, and recon-ng.
   [*] Acquire API keys for Bing, Builtwith, Fullcontact, GitHub, Google, Hashes, Hunter, SecurityTrails, and Shodan for maximum results with recon-ng and theHarvester.

API key locations:

recon-ng
   show keys
   keys add bing_api <value>

theHarvester
   /opt/theHarvester/api-keys.yaml

   Person: Combines info from multiple websites.

RECON

First name:

Last name:

   Parse salesforce: Gather names and positions into a clean list.

Create a free account at salesforce (https://connect.data.com/login).
Perform a search on your target company > select the company name > see all.
Copy the results into a new file.

Enter the location of your list:

About SCANNING in discover
   Generate target list: Use different tools to create a target list including Angry IP Scanner, arp-scan, netdiscover and nmap pingsweep.

SCANNING

1. Local area network
2. NetBIOS
3. netdiscover
4. Ping sweep
5. Previous menu


   CIDR, List, IP, Range, or URL

Type of scan:

1. External

2. Internal
3. Previous menu

  • External scan will set the nmap source port to 53 and the max-rrt-timeout to 1500ms.
  • Internal scan will set the nmap source port to 88 and the max-rrt-timeout to 500ms.
  • Nmap is used to perform host discovery, port scanning, service enumeration and OS identification.
  • Matching nmap scripts are used for additional enumeration.
  • Addition tools: enum4linux, smbclient, and ike-scan.
  • Matching Metasploit auxiliary modules are also leveraged.

About WEB in discover
   Insecure direct object reference

Using Burp, authenticate to a site, map & Spider, then log out.
Target > Site map > select the URL > right click > Copy URLs in this host.

Paste the results into a new file.


Enter the location of your file:

   Open multiple tabs in Firefox

Open multiple tabs in Firefox with:

1. List

2. Directories from robots.txt.
3. Previous menu

  • Use a list containing IPs and/or URLs.
  • Use wget to pull a domain's robot.txt file, then open all of the directories.

   Nikto

Run multiple instances of Nikto in parallel.

1. List of IPs.
2. List of IP:port.
3. Previous menu

   SSL: Use sslscan and sslyze to check for SSL/TLS certificate issues.

Check for SSL certificate issues.

Enter the location of your list:


About MISC in discover
   Parse XML

Parse XML to CSV.

1. Burp (Base64)

2. Nessus (.nessus)
3. Nexpose (XML 2.0)
4. Nmap
5. Qualys
6. revious menu

   Generate a malicious payload

Malicious Payloads

1. android/meterpreter/reverse_tcp
2. cmd/windows/reverse_powershell
3. java/jsp_shell_reverse_tcp (Linux)
4. java/jsp_shell_reverse_tcp (Windows)
5. linux/x64/meterpreter_reverse_https
6. linux/x64/meterpreter_reverse_tcp
7. linux/x64/shell/reverse_tcp
8. osx/x64/meterpreter_reverse_https
9. osx/x64/meterpreter_reverse_tcp
10. php/meterpreter/reverse_tcp
11. python/meterpreter_reverse_https 12. python/meterpreter_reverse_tcp
13. windows/x64/meterpreter_reverse_https
14. windows/x64/meterpreter_reverse_tcp
15. Previous menu

   Start a Metasploit listener

Metasploit Listeners

1. android/meterpreter/reverse_tcp
2. cmd/windows/reverse_powershell
3. java/jsp_shell_reverse_tcp
4. linux/x64/meterpreter_reverse_https
5. linux/x64/meterpreter_reverse_tcp
6. linux/x64/shell/reverse_tcp
7. osx/x64/meterpreter_reverse_https
8. osx/x64/meterpreter_reverse_tcp
9. php/meterpreter/reverse_tcp
10. python/meterpreter_reverse_https
11. python/meterpreter_reverse_tcp
12. windows/x64/meterpreter_reverse_https
13. windows/x64/meterpreter_reverse_tcp
14. Previous menu


Read more
  1. Pentest Tools For Windows
  2. Hacking Tools Online
  3. Hacker Tools
  4. Hacker Tools Free
  5. Hack Tools Mac
  6. World No 1 Hacker Software
  7. Pentest Tools Url Fuzzer
  8. Hacker Tool Kit
  9. Hacking Tools Windows
  10. Pentest Tools Download
  11. Hack Tools For Windows
  12. Hacker Tools
  13. Hack Tools Pc
  14. Hack App
  15. Pentest Tools Free
  16. Hacking Tools Download
  17. Pentest Tools Nmap
  18. What Are Hacking Tools
  19. Pentest Automation Tools
  20. Pentest Tools Find Subdomains
  21. Pentest Tools Port Scanner
  22. Android Hack Tools Github
  23. Hacker Tool Kit
  24. Hacking Tools For Kali Linux
  25. Best Pentesting Tools 2018
  26. Hacking Tools 2019
  27. Hacking Tools Hardware
  28. Pentest Tools Linux
  29. Pentest Tools For Ubuntu
  30. Hack Tools 2019
  31. Hacker Tools
  32. Pentest Tools Free
  33. Game Hacking
  34. Hacker Tools Apk Download
  35. Hackers Toolbox
  36. Pentest Tools Android
  37. Bluetooth Hacking Tools Kali
  38. Pentest Tools For Android
  39. Hacking Tools
  40. Hack App
  41. Free Pentest Tools For Windows
  42. Nsa Hack Tools Download
  43. How To Hack
  44. Hacker Tools Free Download
  45. Hacking Tools 2020
  46. Hacker Tools
  47. Hacker Tool Kit
  48. Hack Tools For Ubuntu
  49. Hacking Tools Kit
  50. Pentest Box Tools Download
  51. Pentest Tools Port Scanner
  52. Usb Pentest Tools
  53. Pentest Tools Port Scanner
  54. Free Pentest Tools For Windows
  55. Pentest Tools For Mac
  56. Pentest Tools Nmap
  57. Hacker Tools Windows
  58. Hacking Tools Github
  59. Hacker Tools Software
  60. Github Hacking Tools
  61. Computer Hacker
  62. Hack Tools Mac
  63. Hacker Security Tools
  64. Hack Tools For Games
  65. How To Install Pentest Tools In Ubuntu
  66. Hacker Tools List
  67. Hack Website Online Tool
  68. Wifi Hacker Tools For Windows
  69. Pentest Tools Alternative
  70. Hacker Tools Hardware
  71. Hacker Tools Online
  72. Hacker Tools Linux
  73. Hacker Techniques Tools And Incident Handling
  74. Hack Rom Tools
  75. Hak5 Tools
  76. Hacking Tools Software
  77. New Hack Tools
  78. Hack Apps
  79. Hacking Tools 2019
  80. Hacking Tools Windows
  81. Pentest Tools Windows
  82. Top Pentest Tools
  83. Hacking Tools Usb
  84. Hacking Tools Kit
  85. Hack Rom Tools
  86. Hacker Tools Online
  87. Pentest Tools Alternative
  88. Hack Tool Apk No Root
  89. What Is Hacking Tools
  90. Hacker Tools Free Download
  91. Hacking Tools Kit
  92. Pentest Tools Website
  93. Hack Tools For Pc
  94. Hacking Tools For Windows Free Download
  95. Hacker Tools Apk Download
  96. Pentest Tools Framework
  97. World No 1 Hacker Software
  98. Pentest Tools For Windows
  99. Hacking Tools Software
  100. Nsa Hack Tools
  101. Best Pentesting Tools 2018
  102. Hacking Tools Software
  103. Pentest Tools Website Vulnerability
  104. Pentest Tools
  105. Hacker Tool Kit
  106. Hacker Security Tools
  107. Growth Hacker Tools
  108. Hack App
  109. Hacking Tools Online
  110. Wifi Hacker Tools For Windows
  111. Top Pentest Tools
  112. Hack Rom Tools
  113. Kik Hack Tools
  114. Hack Tools
  115. Hack Tools Online
  116. Pentest Tools Open Source
  117. Pentest Tools
  118. Pentest Tools Github
  119. Hack Tool Apk
  120. Hack Website Online Tool
  121. Hack Tools
  122. Top Pentest Tools
  123. Hack Tools Download
  124. Hacking Tools 2019
  125. Pentest Tools Website Vulnerability
  126. Pentest Tools Apk
  127. Hacking Tools 2019
  128. Hacker Search Tools
  129. Hacker Tools Free
  130. Hack Tools 2019
  131. Hacker Tools For Ios
  132. Github Hacking Tools
  133. Hacker Hardware Tools
  134. Pentest Tools Windows

No comments:

Post a Comment