Jump to content
Nytro

netool.sh V4.4

Recommended Posts

Posted

netool.sh V4.4

MitM PENTESTING OPENSOURCE T00LKIT v4.4 WIKI

netool.sh toolkit provides a fast and easy way For new arrivals to IT security

pentesting and also to experience users to use allmost all features that the

Man-In-The-Middle can provide under local lan, since scanning, sniffing and

social engeneering attacks "[spear phishing attacks]"...

DESCRIPTION

"Scanning - Sniffing - Social Engeneering"

Netool: its a toolkit written using 'bash, python, ruby' that allows you to

automate frameworks like Nmap, Driftnet, Sslstrip, Metasploit and Ettercap

MitM attacks. this toolkit makes it easy tasks such as SNIFFING tcp/udp traffic,

Man-In-The-Middle attacks, SSL-sniff, DNS-spoofing, D0S attacks in wan/lan

networks, TCP/UDP packet manipulation using etter-filters, and gives you

the ability to capture pictures of target webbrowser surfing (driftnet)

also uses macchanger to decoy scans changing the mac address.

Rootsector: module allows you to automate some attacks over DNS_SPOOF + MitM

(phishing - social engineering) using metasploit, apache2 and ettercap frameworks.

like the generation of payloads,shellcode,backdoors delivered using dns_spoof

and MitM method to redirect a target to your phishing webpage.

Recently was introduced "inurlbr" webscanner (by cleiton) that allow us to search

SQL related bugs, using severeal search engines, also this framework can be

used in conjunction with other frameworks like nmap, (using the flag --comand-vul)

Example: inurlbr.php -q 1,2,10 --dork 'inurl:index.php?id=' --exploit-get ?´0x27

-s report.log --comand-vul 'nmap -Pn -p 1-8080 --script http-enum --open _TARGET_'

* STABLE repository | GIT repository |

| CHANGELOG | BUG-REPORTS *

Operative Systems Supported

Linux-Ubuntu | Linux-kali | Parrot security OS | blackbox OS

Linux-backtrack (un-continued) | Mac osx (un-continued).

"REMARK"

The project 'opensource-kali' as build to work on most pentesting distros,

like: blackbox,parrot,backtrack,kali,etc, with little configuration needed.

Sutch as: install the toolkit in the rigth path, set executable permisions

to all files, and config paths to dependencies (in "toolkit_config" file).

so its the obvious choise if you desire to install the toolkit on a diferent

distro (than ubuntu or kali).

* UBUNTU install | KALI install | OTHER DISTROS install | UNIVERSAL INSTALLER *

Dependencies

"TOOLKIT DEPENDENCIES"

zenity | Nmap | Ettercap | Macchanger | Metasploit | Driftnet | Apache2 | sslstrip

"SCANNER INURLBR.php"

curl | libcurl3 | libcurl3-dev | php5 | php5-cli | php5-curl

* Install zenity | Install nmap | Install ettercap | Install macchanger | Install metasploit | Install Apache2 *

Credits

x0ra-machine "Pentesting Lab" | Apofis Kaizer "Debug on Mac OSx"

Fyodor "Nmap" | ALoR & NaGa "Ettercap" | HD moore "Metasploit"

Moxie M "Sslstrip" | Chris L "Driftnet" | j0rgan "Cupp.py"

Cleiton p "inurlbr.php" | ReL1K "unicorn.py"

"Develop by: pedr0 Ubuntu [r00t-3xp10it]"

Suspicious Shell Activity Labs@2014 | r00tsect0r CyberTeam

Red Team Collaborations

def_main_zps9b4d2de9.png

Sursa: http://sourceforge.net/p/netoolsh/wiki/netool.sh%20script%20project/

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...