Active Members Fi8sVrs Posted June 10, 2018 Active Members Report Posted June 10, 2018 (edited) Pentesting suite for Maltego based on data in a Metasploit database THIS IS A BETA RELEASE, please be nice and report any issues msploitego leverages the data gathered in a Metasploit database by enumerating and creating specific entities for services. Services like samba, smtp, snmp, http have transforms to enumerate even further. Entities can either be loaded from a Metasploit XML file or taken directly from the Postgres msf database Requirements Python 2.7 Has only been tested on Kali Linux software installations Metasploit Framework nmap enum4linux snmp-check nikto exploitdb Installation In Maltego import config from msploitego/src/msploitego/resources/maltego/msploitego.mtz checkout and update the transform path inside Maltego easiest way would be to create a symbolic link to the transforms directory in /root/) ln -s /path/to/your/msploitego/src/msploitego/transforms /root/ General Use Using exported Metasploit xml file run a db_nmap scan in metatasploit, or import a previous scan msf> db_nmap -vvvv -T5 -A -sS -ST -Pn msf> db_import /path/to/your/nmapfile.xml export the database to an xml file msf> db_export -f xml /path/to/your/output.xml In Maltego drag a MetasploitDBXML entity onto the graph. Update the entity with the path to your metasploit database file. run the MetasploitDB transform to enumerate hosts. from there several transforms are available to enumerate services, vulnerabilities stored in the metasploit DB Using Postgres drag and drop a Postgresql DB entity onto the canvas, enter DB details. run the Postgresql transforms directly against a running DB Notes Instead of running a nikto scan directly from Maltego, I've opted to include a field to for a Nikto XML file. Nikto can take long time to run so best to manage that directly from the os. Enter the full path filename in the 'Nikto File' field, then run the Nikto parser to enumerate. TODO's Connect directly to the postgres database - BETA Much, much, much more tranforms for actions on generated entities. Download: msploitego-master.zip git clone https://github.com/shizzz477/msploitego.git Source Edited June 10, 2018 by OKQL Quote