Misc
lyncsmash: This is a collection of tools to enumerate and attack self-hosted Skype for Business and Microsoft Lync installations.
1
python lyncsmash.py enum -H 2013-lync-fe.contoso.com -U usernamelist.txt -P passwordlist.txt -d CONTOSO -o CONTOSO_output.txt
2
python lyncsmash.py enum -H 2013-lync-fe.contoso.com -U usernamelist.txt -p Winter2017 -d CONTOSO
Copied!
MSOLSpray: A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the account, if a tenant doesn't exist, if a user doesn't exist, if the account is locked, or if the account is disabled.
1
Import-Module MSOLSpray.ps1
2
Invoke-MSOLSpray -UserList .\userlist.txt -Password Winter2021
Copied!
patator: Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
1
* ftp_login : Brute-force FTP
2
* ssh_login : Brute-force SSH
3
* telnet_login : Brute-force Telnet
4
* smtp_login : Brute-force SMTP
5
* smtp_vrfy : Enumerate valid users using the SMTP VRFY command
6
* smtp_rcpt : Enumerate valid users using the SMTP RCPT TO command
7
* finger_lookup : Enumerate valid users using Finger
8
* http_fuzz : Brute-force HTTP/HTTPS
9
* rdp_gateway : Brute-force RDP Gateway
10
* ajp_fuzz : Brute-force AJP
11
* pop_login : Brute-force POP
12
* pop_passd : Brute-force poppassd (not POP3)
13
* imap_login : Brute-force IMAP
14
* ldap_login : Brute-force LDAP
15
* dcom_login : Brute-force DCOM
16
* smb_login : Brute-force SMB
17
* smb_lookupsid : Brute-force SMB SID-lookup
18
* rlogin_login : Brute-force rlogin
19
* vmauthd_login : Brute-force VMware Authentication Daemon
20
* mssql_login : Brute-force MSSQL
21
* oracle_login : Brute-force Oracle
22
* mysql_login : Brute-force MySQL
23
* mysql_query : Brute-force MySQL queries
24
* rdp_login : Brute-force RDP (NLA)
25
* pgsql_login : Brute-force PostgreSQL
26
* vnc_login : Brute-force VNC
27
* dns_forward : Brute-force DNS
28
* dns_reverse : Brute-force DNS (reverse lookup subnets)
29
* ike_enum : Enumerate IKE transforms
30
* snmp_login : Brute-force SNMPv1/2 and SNMPv3
31
* unzip_pass : Brute-force the password of encrypted ZIP files
32
* keystore_pass : Brute-force the password of Java keystore files
33
* sqlcipher_pass : Brute-force the password of SQLCipher-encrypted databases
34
* umbraco_crack : Crack Umbraco HMAC-SHA1 password hashes
Copied!
Crowbar (formally known as Levye) is a brute forcing tool that can be used during penetration tests. It was developed to brute force some protocols in a different manner according to other popular brute forcing tools. As an example, while most brute forcing tools use username and password for SSH brute force, Crowbar uses SSH key(s). This allows for any private keys that have been obtained during penetration tests, to be used to attack other SSH servers.
ruler: Ruler is a tool that allows you to interact with Exchange servers remotely, through either the MAPI/HTTP or RPC/HTTP protocol. The main aim is abuse the client-side Outlook features and gain a shell remotely.
impacket: Impacket is a collection of Python classes for working with network protocols. Impacket is focused on providing low-level programmatic access to the packets and for some protocols (e.g. SMB1-3 and MSRPC) the protocol implementation itself. Packets can be constructed from scratch, as well as parsed from raw data, and the object oriented API makes it simple to work with deep hierarchies of protocols. The library provides a set of tools as examples of what can be done within the context of this library.
1
sudo git clone https://github.com/SecureAuthCorp/impacket.git
2
cd impacket/
3
python3 -m venv venv
4
source venv/bin/activate
5
pip install .
6
python setup.py install
7
8
--or--
9
10
python3 -m pip install virtualenv
11
python3 -m venv impkt
12
source impkt/bin/activate
13
(or on windows .\impkt\Scripts\activate.ps1)
14
pip install git+https://github.com/SecureAuthCorp/impacket
Copied!
PRET: PRET - Printer Exploitation Toolkit.
1
$ ./pret.py laserjet.lan pjl
2
________________
3
_/_______________/|
4
/___________/___//|| PRET | Printer Exploitation Toolkit v0.25
5
|=== |----| || by Jens Mueller <[email protected]>
6
| | ô| ||
7
|___________| ô| ||
8
| ||/.´---.|| | || 「 cause your device can be
9
|-||/_____\||-. | |´ more fun than paper jams 」
10
|_||=L==H==||_|__|/
11
12
(ASCII art by
13
Jan Foerster)
14
15
Connection to laserjet.lan established
16
Device: hp LaserJet 4250
17
18
Welcome to the pret shell. Type help or ? to list commands.
19
laserjet.lan:/> help
20
21
Available commands (type help <topic>):
22
=======================================
23
append debug edit free id ls open restart timeout
24
cat delete env fuzz info mirror printenv selftest touch
25
cd df exit get load mkdir put set traversal
26
chvol disable find help lock nvram pwd site unlock
27
close display format hold loop offline reset status version
28
29
laserjet.lan:/>
Copied!
anonymousfox.com: Auto-pwn websites and Cpanel.
https://youtu.be/PMt-t8VHLC0
youtu.be
EyeWitness: EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible. Another interesting project is aquatone.
1
proxychains-ng eyewitness --web -x 192.168.187.0-255.txt.xml --no-dns --no-prompt -d report
Copied!
proxychains
configuration
all .jpg > index.html
eyewitness + burpsuite + custom header
EyeWitness through SOCKS proxy v4
I figured I would leave this information here after my 30 minutes of debugging so someone else doesn't struggle. EyeWitness can be run through a SOCKS proxy v4 by using proxychains, but it requires a very specific setup otherwise everything will timeout.
Note: It looks like EyeWitness does actually support SOCKS v5 via "--proxy-type", but Cobalt Strike is v4 so that doesn't work.
Explanation and other issues:
  • In the latest versions of Kali, you cannot run EyeWitness as root (with sudo) otherwise you'll get a very vague error message of "Message: Unable to find a matching set of capabilities". If you read "geckodriver.log", you'll see the real error message of "Running Firefox as root in a regular user's session is not supported."
  • The EyeWitness directory must be user-writable because EyeWitness writes to that geckodriver.log file. So make sure you chmod the folder correctly.
  • If you run Kali's "proxychains" before "EyeWitness.py" (proxychains ./EyeWitness.py --single 'http://google.com' -d ~/output), you will see a ton of "|S-chain|-<>-SERVER:PORT-<><>-127.0.0.1:54665-<--denied". EyeWitness is trying to connect to the geckodriver that is listening on that port, but that request (127.0.0.1) is going through the SOCKS proxy instead of actually being a localhost request. Thus everything is denied and nothing works.

Instructions on how to make it work

  • Make sure EyeWitness directory is user-writable:
1
chmod -R 777 /opt/eyewitness-git/
Copied!
  • Kali's proxychains does not allow you to exclude IPs from being passed through the SOCKS proxy (which is what is breaking EyeWitness). You need to use the latest support version of Proxychains-ng (the actively developed version of proxychains) that allows exclusions. Complete commands are below for github cloning and installing for your convenience for copy/paste:
1
git clone https://github.com/rofl0r/proxychains-ng ~/proxychains-ng
2
cd ~/proxychains-ng
3
make -s clean
4
./configure --prefix=/usr --sysconfdir=/etc
5
make -s
6
make -s install
7
ln -sf /usr/bin/proxychains4 /usr/local/bin/proxychains-ng
Copied!
  • Add the following line to your /etc/proxychains.conf file (I personally add it after "proxy_dns" but anywhere should work as long as its not at the very bottom under "[ProxyList]"):
1
localnet 127.0.0.0/255.0.0.0
Copied!
  • Add your proxychains server like normal to the bottom of /etc/proxychains.conf
  • Run EyeWitness like normal by prefixing "proxychains-ng" (notice the "-ng" at the end)
1
proxychains-ng ./EyeWitness.py --single 'http://google.com' -d ~/output
Copied!
  • You should now see the NEW version of the "S-Chain" line where it no longer uses ASCII arrows, see below:
Done! You can now run EyeWitness through CobaltStrike as long as you prefix it with "proxychains-ng" instead of the old, crappy "proxychains"
1
for I in $(ls); do
2
echo "$I" >> index.html;
3
echo "<img src=$I><br>" >> index.html;
4
done
Copied!
1. Install BurpExtension: Add Custom Header
Add Custom Header
2. BurpSuite > Add Custom Header
3. BurpSuite > Project Options > Sessions
Add new rule (Rule 3), and on "Rule Actions" enable the "Invoke the extension handler" and finally pick "Add Custom Header" extension. Ensure you enable in the "Scope" menu the "Proxy" option and also includes the scope/target URL or simply "Include all URLs".
4. Run eyewitness via proxy
1
eyewitness --proxy-ip 127.0.0.1 --proxy-port 8080 -f files.txt --web
Copied!
gowitness: gowitness - a golang, web screenshot utility using Chrome Headless.
1
###multiple shots from a file####
2
for /F "delims=" %%a in (hosts.txt) do (
3
gowitness-2.3.4-windows-amd64.exe single %%a
4
)
Copied!
webscreenshot: A simple script to screenshot a list of websites, based on the url-to-image PhantomJS script. It can add customized headers.
updog: Updog is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S, can set ad hoc SSL certificates and use http basic auth.
radamsa: Radamsa is a test case generator for robustness testing, a.k.a. a fuzzer. It is typically used to test how well a program can withstand malformed and potentially malicious inputs. It works by reading sample files of valid data and generating interestringly different outputs from them. The main selling points of radamsa are that it has already found a slew of bugs in programs that actually matter, it is easily scriptable and, easy to get up and running.
1
git clone https://gitlab.com/akihe/radamsa.git && cd radamsa && make && sudo make install
2
echo "HAL 9000" | radamsa
Copied!
airventriloquist-ng injects on encrypted WiFi packet and circumvents wireless intrusion prevention systems.
airventriloquist-ng(8) — aircrack-ng — Debian unstable — Debian Manpages
Copy link