Jump to content
Fi8sVrs

Pen Testing Scripts

Recommended Posts

  • Active Members
Posted

New tools released 2014.

Whatsfree

https://github.com/commonexploits/whatsfree

Useful for when conducting pentests. Quickly find a live IP address to use.

This can be handy when the client says “just pick one that is free” or when they give you a spreadsheet with an IP address to use and you want to ensure it is really free. Quite often typos will occur and you could take out a live box if you set the wrong IP.

You do not need to set any IP address on your interface, just run it and it will list what IPs are free in the local subnet you enter.

whatsfree.png

Livehosts

https://github.com/commonexploits/livehosts

This is a cut down version of LazyMap script I released. It will scan the given local or remote subnet and discover and count which hosts are live.

Works very quickly just using some NMAP switches, lists and counts them. Handy for input into Nessus and also to work out how populated the VLANs are.

During a pentest typically you will be given a spreadsheet with a list of VLANs and expected number of hosts. I always run this and then make a note of how many hosts were actually there. for example you expect to see 4 hosts and you see 40, this could impact the schedule so is worth alerting people at an early stage.

livehosts.png

Sonijohn

https://github.com/commonexploits/sonijohn

Something I created on the spot during a review on some Sonicwall firewalls. I wanted to check the password strength for the users. Sonicwall firewall configs export in a base64 file.

This script you just point at the exported config file, it will decode it and extract all usernames and password hashes. It then changes them around in a way that makes them compatible with John the Ripper password cracker.

So just then run John at them and it will work.

sonijohn.png

Junijohn

https://github.com/commonexploits/junijohn

Much like the Sonicwall scipt, this is the same thing for Juniper Firewalls.

junijohn.png

DTPscan

https://github.com/commonexploits/dtpscan

This is a PASSIVE VLAN hopping script. I have updated and fixed this as a recent change to the way tshark outputs a summary broke this script.

This will sniff a network port (no IP address needed) and look for DTP packets. If it finds DTP it will work out what mode it is in and tell you and indicate if it thinks VLAN hopping will be possible.

Then you could run something like Frogger to carry out an ACTIVE attack to hop VLANS. A lot of clients now want to know “can you VLAN hop” this will tell you within 90 seconds if you can or not.

dtpscan.png

WinocPHC (Windows Offline Password Hash Checker)

https://github.com/commonexploits/winocphc

Simply point at any extract password hashes from Windows operating systems that have been extracted with tools such as FGDump, pwdump, gsecdump etc.

It will look through and highlight any user accounts that have the same password set and list the users. Also checks and separates disabled or previously used passwords.

This is useful if you have extract domain hashes and find that half the users have the same password, this is likely to indicate an issue in the user creation process where the user is not being forced to change the password at first login. Also is good to highly password history issues, if the user can keep setting the same password it will list that too.

winocphc.jpeg

LazyMap

https://github.com/commonexploits/port-scan-automation

Useful for any kind of internal infrastructure testing/VA. This will discover the live hosts, then port scan with NMAP just the live hosts.

It then will list out all the unique open ports and then create you a Nessus policy. Then you just import the Nessus policy (which contains just the open ports found) and paste in the live hosts. This will be a much faster and accurate test as it is only scanning the live hosts and open ports. Also records start/stop times etc. Outputs all findings into client folders and auto excludes your own IP address. How many people Nessus the complete range where your tester laptops are and do not exclude?

lazymap.png

IPGen

https://github.com/commonexploits/port-scan-automation

A very simple script to generate IP address lists. Just give it a range and any IP addresses to exclude (see above, you want to exclude yourself and any other testers) and it will spit out a list of IP addresses. Then just paste these into Nessus etc.

ipgen.png

wEAPe

https://github.com/commonexploits/weape

A wireless network tool for testing managed wireless networks using 802.1x (PEAP/LEAP etc). It will assiocate against the AP and wait and extract any hostnames or domain usernames from the traffic as they authenticate to the wireless network. You do not need the wireless key/cert to do this.

weape.png

Frogger

https://github.com/commonexploits/vlan-hopping

An ACTIVE VLAN hopping tool. This will abuse the DTP protocol and imitate a trunk port. It will then extract any VLAN information from the switch and allow you to hop onto the other VLANs.

frogger.png

Av0id

https://github.com/nccgroup/metasploitavevasion

handy little script to create Metasploit payloads to shell boxes running various Anti-Virus programs. Unfortunately these has been submitted to online scanners such as VirusTotal which share info with A.V vendors, therefore it doesn’t work too good now and gets flagged!

avoid.png

EasyDA

https://github.com/nccgroup/easyda

A great tool for any Windows based infrastructure test. Insert a Windows password hash or clear text password and range of IPs. It will look for common password reuse within the network. It will also track down and look for where the Domain Administrator account is logged in. If common passwords exist and you find where the DA is, its game over. You are the domain admin, just impersonate the token and job done.

easyda.png

Cisc0wn

https://github.com/nccgroup/cisco-SNMP-enumeration

Cisco SNMP enumeration, brute force, config downloader and password cracking script. Automate SNMP community checking, information extraction and configuration downloads from Cisco devices.

ciscown.png

Source

  • Upvote 1

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...