Classic Cars : Discover: A Custom Bash Scripts Used To Perform Pentesting Tasks With Metasploit

Sunday, August 23, 2020

Discover: A Custom Bash Scripts Used To Perform Pentesting Tasks With Metasploit


About discover: discover is a custom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit Framework. For use with Kali Linux, Parrot Security OS and the Penetration Testers Framework (PTF).

About authors:


discover Installation and Updating


About RECON in discover
   Domain

RECON

1. Passive

2. Active
3. Import names into an existing recon-ng workspace
4. Previous menu

   Passive uses ARIN, dnsrecon, goofile, goog-mail, goohost, theHarvester, Metasploit Framework, URLCrazy, Whois, multiple websites, and recon-ng.

   Active uses dnsrecon, WAF00W, traceroute, Whatweb, and recon-ng.
   [*] Acquire API keys for Bing, Builtwith, Fullcontact, GitHub, Google, Hashes, Hunter, SecurityTrails, and Shodan for maximum results with recon-ng and theHarvester.

API key locations:

recon-ng
   show keys
   keys add bing_api <value>

theHarvester
   /opt/theHarvester/api-keys.yaml

   Person: Combines info from multiple websites.

RECON

First name:

Last name:

   Parse salesforce: Gather names and positions into a clean list.

Create a free account at salesforce (https://connect.data.com/login).
Perform a search on your target company > select the company name > see all.
Copy the results into a new file.

Enter the location of your list:

About SCANNING in discover
   Generate target list: Use different tools to create a target list including Angry IP Scanner, arp-scan, netdiscover and nmap pingsweep.

SCANNING

1. Local area network
2. NetBIOS
3. netdiscover
4. Ping sweep
5. Previous menu


   CIDR, List, IP, Range, or URL

Type of scan:

1. External

2. Internal
3. Previous menu

  • External scan will set the nmap source port to 53 and the max-rrt-timeout to 1500ms.
  • Internal scan will set the nmap source port to 88 and the max-rrt-timeout to 500ms.
  • Nmap is used to perform host discovery, port scanning, service enumeration and OS identification.
  • Matching nmap scripts are used for additional enumeration.
  • Addition tools: enum4linux, smbclient, and ike-scan.
  • Matching Metasploit auxiliary modules are also leveraged.

About WEB in discover
   Insecure direct object reference

Using Burp, authenticate to a site, map & Spider, then log out.
Target > Site map > select the URL > right click > Copy URLs in this host.

Paste the results into a new file.


Enter the location of your file:

   Open multiple tabs in Firefox

Open multiple tabs in Firefox with:

1. List

2. Directories from robots.txt.
3. Previous menu

  • Use a list containing IPs and/or URLs.
  • Use wget to pull a domain's robot.txt file, then open all of the directories.

   Nikto

Run multiple instances of Nikto in parallel.

1. List of IPs.
2. List of IP:port.
3. Previous menu

   SSL: Use sslscan and sslyze to check for SSL/TLS certificate issues.

Check for SSL certificate issues.

Enter the location of your list:


About MISC in discover
   Parse XML

Parse XML to CSV.

1. Burp (Base64)

2. Nessus (.nessus)
3. Nexpose (XML 2.0)
4. Nmap
5. Qualys
6. revious menu

   Generate a malicious payload

Malicious Payloads

1. android/meterpreter/reverse_tcp
2. cmd/windows/reverse_powershell
3. java/jsp_shell_reverse_tcp (Linux)
4. java/jsp_shell_reverse_tcp (Windows)
5. linux/x64/meterpreter_reverse_https
6. linux/x64/meterpreter_reverse_tcp
7. linux/x64/shell/reverse_tcp
8. osx/x64/meterpreter_reverse_https
9. osx/x64/meterpreter_reverse_tcp
10. php/meterpreter/reverse_tcp
11. python/meterpreter_reverse_https 12. python/meterpreter_reverse_tcp
13. windows/x64/meterpreter_reverse_https
14. windows/x64/meterpreter_reverse_tcp
15. Previous menu

   Start a Metasploit listener

Metasploit Listeners

1. android/meterpreter/reverse_tcp
2. cmd/windows/reverse_powershell
3. java/jsp_shell_reverse_tcp
4. linux/x64/meterpreter_reverse_https
5. linux/x64/meterpreter_reverse_tcp
6. linux/x64/shell/reverse_tcp
7. osx/x64/meterpreter_reverse_https
8. osx/x64/meterpreter_reverse_tcp
9. php/meterpreter/reverse_tcp
10. python/meterpreter_reverse_https
11. python/meterpreter_reverse_tcp
12. windows/x64/meterpreter_reverse_https
13. windows/x64/meterpreter_reverse_tcp
14. Previous menu


Related posts

  1. Pentest Tools Url Fuzzer
  2. Computer Hacker
  3. Hacker Security Tools
  4. Pentest Box Tools Download
  5. Hack Tools For Ubuntu
  6. Hack Tools Mac
  7. Hacker Tools Software
  8. Hackrf Tools
  9. Hacker Tools Apk
  10. Pentest Recon Tools
  11. World No 1 Hacker Software
  12. Pentest Tools Port Scanner
  13. Hacks And Tools
  14. Hacker Tools 2020
  15. Growth Hacker Tools
  16. Pentest Tools For Windows
  17. Pentest Tools Port Scanner
  18. Hacking Tools For Windows 7
  19. Hacker Tools Free
  20. Free Pentest Tools For Windows
  21. Hacker Tools For Ios
  22. Hack And Tools
  23. Pentest Tools Download
  24. Hacking Tools 2020
  25. Hacking Tools For Pc
  26. Android Hack Tools Github
  27. Pentest Box Tools Download
  28. Hack Tools
  29. Hack Tools For Games
  30. Pentest Tools Review
  31. Hacking Tools 2020
  32. Hack Tools Online
  33. Black Hat Hacker Tools
  34. Nsa Hack Tools Download
  35. Hacker Tool Kit
  36. Github Hacking Tools
  37. Pentest Box Tools Download
  38. Pentest Tools Subdomain
  39. Hacking Tools Free Download
  40. Growth Hacker Tools
  41. Hack Tools For Games
  42. Tools Used For Hacking
  43. Growth Hacker Tools
  44. Pentest Reporting Tools
  45. Hack Tools For Ubuntu
  46. Termux Hacking Tools 2019
  47. Hack Tools For Mac
  48. Hack Tools 2019
  49. Best Hacking Tools 2019
  50. Pentest Automation Tools
  51. Hacker Tools For Pc
  52. Kik Hack Tools
  53. Hacker Hardware Tools
  54. What Are Hacking Tools
  55. Pentest Tools Website
  56. Install Pentest Tools Ubuntu
  57. Hacking Tools Mac
  58. Hacking App
  59. Game Hacking
  60. Hacking Tools For Kali Linux
  61. Bluetooth Hacking Tools Kali
  62. Pentest Box Tools Download
  63. Hack Tools
  64. Hack Tools For Windows
  65. Bluetooth Hacking Tools Kali
  66. Hacking Tools For Windows
  67. Hacking Tools Software
  68. Hacking Tools For Games
  69. Hacking Tools For Games
  70. Pentest Tools Website Vulnerability
  71. Hacking Tools Free Download
  72. Pentest Tools List
  73. Usb Pentest Tools
  74. Hacker Tools Mac
  75. Hacker Tools Mac
  76. Hacker Tools For Pc
  77. Termux Hacking Tools 2019
  78. Hacking Tools Github
  79. Top Pentest Tools
  80. Hacking Tools For Windows 7
  81. Nsa Hack Tools Download
  82. Wifi Hacker Tools For Windows
  83. Hacker Tools Apk Download
  84. Pentest Reporting Tools
  85. Nsa Hack Tools
  86. Hacker Search Tools
  87. Tools Used For Hacking
  88. Hacking Tools For Windows 7
  89. Hacking Tools For Windows Free Download
  90. Blackhat Hacker Tools
  91. Pentest Tools Review
  92. Github Hacking Tools
  93. Pentest Tools
  94. Hacker Tools Free Download
  95. Pentest Recon Tools
  96. Black Hat Hacker Tools
  97. Hacker Tools Free
  98. Hacking Tools For Windows 7
  99. Pentest Tools Website
  100. Hacker Tools Linux
  101. Pentest Tools Review
  102. Pentest Tools List
  103. Hacker Tools 2020
  104. Blackhat Hacker Tools
  105. Hacker Techniques Tools And Incident Handling
  106. Hack Tools Pc
  107. Pentest Tools Bluekeep
  108. Black Hat Hacker Tools
  109. Hacker Security Tools
  110. Pentest Tools Port Scanner
  111. Pentest Tools Subdomain
  112. Pentest Tools For Android
  113. Hacking Tools Windows
  114. Pentest Tools Download
  115. Hacker Tools Online
  116. Hacking Tools Software
  117. Hack And Tools
  118. Hacker
  119. Hackrf Tools
  120. Beginner Hacker Tools
  121. Ethical Hacker Tools
  122. Hacking Tools Kit
  123. Hacking Tools Download
  124. Hacking Tools For Windows
  125. Hacker Techniques Tools And Incident Handling
  126. Hacker Tools Linux
  127. Hacking Tools For Mac
  128. Hacker Tools
  129. Easy Hack Tools
  130. Hacker Tools Apk Download
  131. Hacking Tools Hardware
  132. Hack Tools For Games
  133. Easy Hack Tools
  134. Hack Tools For Mac
  135. Hacker Security Tools
  136. Hack Tools
  137. Hack Tools Online
  138. Pentest Tools Review
  139. Pentest Tools Bluekeep
  140. Pentest Tools Linux
  141. Hacker Techniques Tools And Incident Handling
  142. Pentest Tools Website Vulnerability
  143. Bluetooth Hacking Tools Kali
  144. Hacking Tools Usb
  145. Physical Pentest Tools
  146. What Are Hacking Tools
  147. Hacking Tools Download
  148. Pentest Tools Download
  149. Hacker Tools Mac
  150. Hack Tool Apk No Root
  151. Hacks And Tools
  152. Hack Tools Mac
  153. Pentest Tools Website Vulnerability
  154. Hacker Tool Kit
  155. Hacker Tools Windows
  156. What Is Hacking Tools
  157. Pentest Tools Online
  158. Hacking Tools For Games
  159. How To Install Pentest Tools In Ubuntu
  160. Hacking Tools Windows
  161. Hack Tools Mac
  162. Hack Tools For Ubuntu
  163. Hacker Tools Hardware
  164. Free Pentest Tools For Windows
  165. Hack Apps
  166. Hacking Tools Hardware
  167. Hacking Tools Hardware

No comments:

Post a Comment