FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Before yesterdayYour RSS feeds

Ashok - A OSINT Recon Tool, A.K.A Swiss Army Knife

By: Zion3R


Reconnaissance is the first phase of penetration testing which means gathering information before any real attacks are planned So Ashok is an Incredible fast recon tool for penetration tester which is specially designed for Reconnaissance" title="Reconnaissance">Reconnaissance phase. And in Ashok-v1.1 you can find the advanced google dorker and wayback crawling machine.



Main Features

- Wayback Crawler Machine
- Google Dorking without limits
- Github Information Grabbing
- Subdomain Identifier
- Cms/Technology Detector With Custom Headers

Installation

~> git clone https://github.com/ankitdobhal/Ashok
~> cd Ashok
~> python3.7 -m pip3 install -r requirements.txt

How to use Ashok?

A detailed usage guide is available on Usage section of the Wiki.

But Some index of options is given below:

Docker

Ashok can be launched using a lightweight Python3.8-Alpine Docker image.

$ docker pull powerexploit/ashok-v1.2
$ docker container run -it powerexploit/ashok-v1.2 --help


    Credits



    NetworkSherlock - Powerful And Flexible Port Scanning Tool With Shodan

    By: Zion3R


    NetworkSherlock is a powerful and flexible port scanning tool designed for network security professionals and penetration testers. With its advanced capabilities, NetworkSherlock can efficiently scan IP ranges, CIDR blocks, and multiple targets. It stands out with its detailed banner grabbing capabilities across various protocols and integration with Shodan, the world's premier service for scanning and analyzing internet-connected devices. This Shodan integration enables NetworkSherlock to provide enhanced scanning capabilities, giving users deeper insights into network vulnerabilities and potential threats. By combining local port scanning with Shodan's extensive database, NetworkSherlock offers a comprehensive tool for identifying and analyzing network security issues.


    Features

    • Scans multiple IPs, IP ranges, and CIDR blocks.
    • Supports port scanning over TCP and UDP protocols.
    • Detailed banner grabbing feature.
    • Ping check for identifying reachable targets.
    • Multi-threading support for fast scanning operations.
    • Option to save scan results to a file.
    • Provides detailed version information.
    • Colorful console output for better readability.
    • Shodan integration for enhanced scanning capabilities.
    • Configuration file support for Shodan API key.

    Installation

    NetworkSherlock requires Python 3.6 or later.

    1. Clone the repository:
      git clone https://github.com/HalilDeniz/NetworkSherlock.git
    2. Install the required packages:
      pip install -r requirements.txt

    Configuration

    Update the networksherlock.cfg file with your Shodan API key:

    [SHODAN]
    api_key = YOUR_SHODAN_API_KEY

    Usage

    Port Scan Tool positional arguments: target Target IP address(es), range, or CIDR (e.g., 192.168.1.1, 192.168.1.1-192.168.1.5, 192.168.1.0/24) options: -h, --help show this help message and exit -p PORTS, --ports PORTS Ports to scan (e.g. 1-1024, 21,22,80, or 80) -t THREADS, --threads THREADS Number of threads to use -P {tcp,udp}, --protocol {tcp,udp} Protocol to use for scanning -V, --version-info Used to get version information -s SAVE_RESULTS, --save-results SAVE_RESULTS File to save scan results -c, --ping-check Perform ping check before scanning --use-shodan Enable Shodan integration for additional information " dir="auto">
    python3 networksherlock.py --help
    usage: networksherlock.py [-h] [-p PORTS] [-t THREADS] [-P {tcp,udp}] [-V] [-s SAVE_RESULTS] [-c] target

    NetworkSherlock: Port Scan Tool

    positional arguments:
    target Target IP address(es), range, or CIDR (e.g., 192.168.1.1, 192.168.1.1-192.168.1.5,
    192.168.1.0/24)

    options:
    -h, --help show this help message and exit
    -p PORTS, --ports PORTS
    Ports to scan (e.g. 1-1024, 21,22,80, or 80)
    -t THREADS, --threads THREADS
    Number of threads to use
    -P {tcp,udp}, --protocol {tcp,udp}
    Protocol to use for scanning
    -V, --version-info Used to get version information
    -s SAVE_RESULTS, --save-results SAVE_RESULTS
    File to save scan results
    -c, --ping-check Perform ping check before scanning
    --use-shodan Enable Shodan integration for additional information

    Basic Parameters

    • target: The target IP address(es), IP range, or CIDR block to scan.
    • -p, --ports: Ports to scan (e.g., 1-1000, 22,80,443).
    • -t, --threads: Number of threads to use.
    • -P, --protocol: Protocol to use for scanning (tcp or udp).
    • -V, --version-info: Obtain version information during banner grabbing.
    • -s, --save-results: Save results to the specified file.
    • -c, --ping-check: Perform a ping check before scanning.
    • --use-shodan: Enable Shodan integration.

    Example Usage

    Basic Port Scan

    Scan a single IP address on default ports:

    python networksherlock.py 192.168.1.1

    Custom Port Range

    Scan an IP address with a custom range of ports:

    python networksherlock.py 192.168.1.1 -p 1-1024

    Multiple IPs and Port Specification

    Scan multiple IP addresses on specific ports:

    python networksherlock.py 192.168.1.1,192.168.1.2 -p 22,80,443

    CIDR Block Scan

    Scan an entire subnet using CIDR notation:

    python networksherlock.py 192.168.1.0/24 -p 80

    Using Multi-Threading

    Perform a scan using multiple threads for faster execution:

    python networksherlock.py 192.168.1.1-192.168.1.5 -p 1-1024 -t 20

    Scanning with Protocol Selection

    Scan using a specific protocol (TCP or UDP):

    python networksherlock.py 192.168.1.1 -p 53 -P udp

    Scan with Shodan

    python networksherlock.py 192.168.1.1 --use-shodan

    Scan Multiple Targets with Shodan

    python networksherlock.py 192.168.1.1,192.168.1.2 -p 22,80,443 -V --use-shodan

    Banner Grabbing and Save Results

    Perform a detailed scan with banner grabbing and save results to a file:

    python networksherlock.py 192.168.1.1 -p 1-1000 -V -s results.txt

    Ping Check Before Scanning

    Scan an IP range after performing a ping check:

    python networksherlock.py 10.0.0.1-10.0.0.255 -c

    OUTPUT EXAMPLE

    $ python3 networksherlock.py 10.0.2.12 -t 25 -V -p 21-6000 -t 25
    ********************************************
    Scanning target: 10.0.2.12
    Scanning IP : 10.0.2.12
    Ports : 21-6000
    Threads : 25
    Protocol : tcp
    ---------------------------------------------
    Port Status Service VERSION
    22 /tcp open ssh SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1
    21 /tcp open telnet 220 (vsFTPd 2.3.4)
    80 /tcp open http HTTP/1.1 200 OK
    139 /tcp open netbios-ssn %SMBr
    25 /tcp open smtp 220 metasploitable.localdomain ESMTP Postfix (Ubuntu)
    23 /tcp open smtp #' #'
    445 /tcp open microsoft-ds %SMBr
    514 /tcp open shell
    512 /tcp open exec Where are you?
    1524/tcp open ingreslock ro ot@metasploitable:/#
    2121/tcp open iprop 220 ProFTPD 1.3.1 Server (Debian) [::ffff:10.0.2.12]
    3306/tcp open mysql >
    5900/tcp open unknown RFB 003.003
    53 /tcp open domain
    ---------------------------------------------

    OutPut Example

    $ python3 networksherlock.py 10.0.2.0/24 -t 10 -V -p 21-1000
    ********************************************
    Scanning target: 10.0.2.1
    Scanning IP : 10.0.2.1
    Ports : 21-1000
    Threads : 10
    Protocol : tcp
    ---------------------------------------------
    Port Status Service VERSION
    53 /tcp open domain
    ********************************************
    Scanning target: 10.0.2.2
    Scanning IP : 10.0.2.2
    Ports : 21-1000
    Threads : 10
    Protocol : tcp
    ---------------------------------------------
    Port Status Service VERSION
    445 /tcp open microsoft-ds
    135 /tcp open epmap
    ********************************************
    Scanning target: 10.0.2.12
    Scanning IP : 10.0.2.12
    Ports : 21- 1000
    Threads : 10
    Protocol : tcp
    ---------------------------------------------
    Port Status Service VERSION
    21 /tcp open ftp 220 (vsFTPd 2.3.4)
    22 /tcp open ssh SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1
    23 /tcp open telnet #'
    80 /tcp open http HTTP/1.1 200 OK
    53 /tcp open kpasswd 464/udpcp
    445 /tcp open domain %SMBr
    3306/tcp open mysql >
    ********************************************
    Scanning target: 10.0.2.20
    Scanning IP : 10.0.2.20
    Ports : 21-1000
    Threads : 10
    Protocol : tcp
    ---------------------------------------------
    Port Status Service VERSION
    22 /tcp open ssh SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.9

    Contributing

    Contributions are welcome! To contribute to NetworkSherlock, follow these steps:

    1. Fork the repository.
    2. Create a new branch for your feature or bug fix.
    3. Make your changes and commit them.
    4. Push your changes to your forked repository.
    5. Open a pull request in the main repository.

    Contact



    Scanner-and-Patcher - A Web Vulnerability Scanner And Patcher

    By: Zion3R


    This tools is very helpful for finding vulnerabilities present in the Web Applications.

    • A web application scanner explores a web application by crawling through its web pages and examines it for security vulnerabilities, which involves generation of malicious inputs and evaluation of application's responses.
      • These scanners are automated tools that scan web applications to look for security vulnerabilities. They test web applications for common security problems such as cross-site scripting (XSS), SQL injection, and cross-site request forgery (CSRF).
      • This scanner uses different tools like nmap, dnswalk, dnsrecon, dnsenum, dnsmap etc in order to scan ports, sites, hosts and network to find vulnerabilites like OpenSSL CCS Injection, Slowloris, Denial of Service, etc.

    Tools Used

    Serial No. Tool Name Serial No. Tool Name
    1 whatweb 2 nmap
    3 golismero 4 host
    5 wget 6 uniscan
    7 wafw00f 8 dirb
    9 davtest 10 theharvester
    11 xsser 12 fierce
    13 dnswalk 14 dnsrecon
    15 dnsenum 16 dnsmap
    17 dmitry 18 nikto
    19 whois 20 lbd
    21 wapiti 22 devtest
    23 sslyze

    Working

    Phase 1

    • User has to write:- "python3 web_scan.py (https or http) ://example.com"
    • At first program will note initial time of running, then it will make url with "www.example.com".
    • After this step system will check the internet connection using ping.
    • Functionalities:-
      • To navigate to helper menu write this command:- --help for update --update
      • If user want to skip current scan/test:- CTRL+C
      • To quit the scanner use:- CTRL+Z
      • The program will tell scanning time taken by the tool for a specific test.

    Phase 2

    • From here the main function of scanner will start:
    • The scanner will automatically select any tool to start scanning.
    • Scanners that will be used and filename rotation (default: enabled (1)
    • Command that is used to initiate the tool (with parameters and extra params) already given in code
    • After founding vulnerability in web application scanner will classify vulnerability in specific format:-
      • [Responses + Severity (c - critical | h - high | m - medium | l - low | i - informational) + Reference for Vulnerability Definition and Remediation]
      • Here c or critical defines most vulnerability wheres l or low is for least vulnerable system

    Definitions:-

    • Critical:- Vulnerabilities that score in the critical range usually have most of the following characteristics: Exploitation of the vulnerability likely results in root-level compromise of servers or infrastructure devices.Exploitation is usually straightforward, in the sense that the attacker does not need any special authentication credentials or knowledge about individual victims, and does not need to persuade a target user, for example via social engineering, into performing any special functions.

    • High:- An attacker can fully compromise the confidentiality, integrity or availability, of a target system without specialized access, user interaction or circumstances that are beyond the attacker’s control. Very likely to allow lateral movement and escalation of attack to other systems on the internal network of the vulnerable application. The vulnerability is difficult to exploit. Exploitation could result in elevated privileges. Exploitation could result in a significant data loss or downtime.

    • Medium:- An attacker can partially compromise the confidentiality, integrity, or availability of a target system. Specialized access, user interaction, or circumstances that are beyond the attacker’s control may be required for an attack to succeed. Very likely to be used in conjunction with other vulnerabilities to escalate an attack.Vulnerabilities that require the attacker to manipulate individual victims via social engineering tactics. Denial of service vulnerabilities that are difficult to set up. Exploits that require an attacker to reside on the same local network as the victim. Vulnerabilities where exploitation provides only very limited access. Vulnerabilities that require user privileges for successful exploitation.

    • Low:- An attacker has limited scope to compromise the confidentiality, integrity, or availability of a target system. Specialized access, user interaction, or circumstances that are beyond the attacker’s control is required for an attack to succeed. Needs to be used in conjunction with other vulnerabilities to escalate an attack.

    • Info:- An attacker can obtain information about the web site. This is not necessarily a vulnerability, but any information which an attacker obtains might be used to more accurately craft an attack at a later date. Recommended to restrict as far as possible any information disclosure.

    • CVSS V3 SCORE RANGE SEVERITY IN ADVISORY
      0.1 - 3.9 Low
      4.0 - 6.9 Medium
      7.0 - 8.9 High
      9.0 - 10.0 Critical

    Vulnerabilities

    • After this scanner will show results which inclues:
      • Response time
      • Total time for scanning
      • Class of vulnerability

    Remediation

    • Now, Scanner will tell about harmful effects of that specific type vulnerabilility.
    • Scanner tell about sources to know more about the vulnerabilities. (websites).
    • After this step, scanner suggests some remdies to overcome the vulnerabilites.

    Phase 3

    • Scanner will Generate a proper report including
      • Total number of vulnerabilities scanned
      • Total number of vulnerabilities skipped
      • Total number of vulnerabilities detected
      • Time taken for total scan
      • Details about each and every vulnerabilites.
    • Writing all scan files output into SA-Debug-ScanLog for debugging purposes under the same directory
    • For Debugging Purposes, You can view the complete output generated by all the tools named SA-Debug-ScanLog.

    Use

    Use Program as python3 web_scan.py (https or http) ://example.com
    --help
    --update
    Serial No. Vulnerabilities to Scan Serial No. Vulnerabilities to Scan
    1 IPv6 2 Wordpress
    3 SiteMap/Robot.txt 4 Firewall
    5 Slowloris Denial of Service 6 HEARTBLEED
    7 POODLE 8 OpenSSL CCS Injection
    9 FREAK 10 Firewall
    11 LOGJAM 12 FTP Service
    13 STUXNET 14 Telnet Service
    15 LOG4j 16 Stress Tests
    17 WebDAV 18 LFI, RFI or RCE.
    19 XSS, SQLi, BSQL 20 XSS Header not present
    21 Shellshock Bug 22 Leaks Internal IP
    23 HTTP PUT DEL Methods 24 MS10-070
    25 Outdated 26 CGI Directories
    27 Interesting Files 28 Injectable Paths
    29 Subdomains 30 MS-SQL DB Service
    31 ORACLE DB Service 32 MySQL DB Service
    33 RDP Server over UDP and TCP 34 SNMP Service
    35 Elmah 36 SMB Ports over TCP and UDP
    37 IIS WebDAV 38 X-XSS Protection

    Installation

    git clone https://github.com/Malwareman007/Scanner-and-Patcher.git
    cd Scanner-and-Patcher/setup
    python3 -m pip install --no-cache-dir -r requirements.txt

    Screenshots of Scanner

    Contributions

    Template contributions , Feature Requests and Bug Reports are more than welcome.

    Authors

    GitHub: @Malwareman007
    GitHub: @Riya73
    GitHub:@nano-bot01

    Contributing

    Contributions, issues and feature requests are welcome!
    Feel free to check issues page.



    Nmap-API - Uses Python3.10, Debian, python-Nmap, And Flask Framework To Create A Nmap API That Can Do Scans With A Good Speed Online And Is Easy To Deploy


    Uses python3.10, Debian, python-Nmap, and flask framework to create a Nmap API that can do scans with a good speed online and is easy to deploy.

    This is a implementation for our college PCL project which is still under development and constantly updating.


    API Reference

    Get all items

      GET /api/p1/{username}:{password}/{target}
    GET /api/p2/{username}:{password}/{target}
    GET /api/p3/{username}:{password}/{target}
    GET /api/p4/{username}:{password}/{target}
    GET /api/p5/{username}:{password}/{target}
    Parameter Type Description
    username string Required. username of the current user
    password string Required. current user password
    target string Required. The target Hostname and IP

    Get item

      GET /api/p1/
    GET /api/p2/
    GET /api/p3/
    GET /api/p4/
    GET /api/p5/
    Parameter Return data Description Nmap Command
    p1 json Effective Scan -Pn -sV -T4 -O -F
    p2 json Simple Scan -Pn -T4 -A -v
    p3 json Low Power Scan -Pn -sS -sU -T4 -A -v
    p4 json Partial Intense Scan -Pn -p- -T4 -A -v
    p5 json Complete Intense Scan -Pn -sS -sU -T4 -A -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 --script=vuln

    Auth and User management

      POST /adduser/{admin-username}:{admin-passwd}/{id}/{username}/{passwd}
    POST /deluser/{admin-username}:{admin-passwd}/{t-username}/{t-userpass}
    POST /altusername/{admin-username}:{admin-passwd}/{t-user-id}/{new-t-username}
    POST /altuserid/{admin-username}:{admin-passwd}/{new-t-user-id}/{t-username}
    POST /altpassword/{admin-username}:{admin-passwd}/{t-username}/{new-t-userpass}
    • make sure you use the ADMIN CREDS MENTIONED BELOW
    Parameter Type Description
    admin-username String Admin username
    admin-passwd String Admin password
    id String Id for newly added user
    username String Username of the newly added user
    passwd String Password of the newly added user
    t-username String Target username
    t-user-id String Target userID
    t-userpass String Target users password
    new-t-username String New username for the target
    new-t-user-id String New userID for the target
    new-t-userpass String New password for the target

    DEFAULT CREDENTIALS

    ADMINISTRATOR : zAp6_oO~t428)@,



    GPT_Vuln-analyzer - Uses ChatGPT API And Python-Nmap Module To Use The GPT3 Model To Create Vulnerability Reports Based On Nmap Scan Data


    This is a Proof Of Concept application that demostrates how AI can be used to generate accurate results for vulnerability analysis and also allows further utilization of the already super useful ChatGPT.

    Requirements

    • Python 3.10
    • All the packages mentioned in the requirements.txt file
    • OpenAi api

    Usage

    • First Change the "API__KEY" part of the code with OpenAI api key
    openai.api_key = "__API__KEY" # Enter your API key
    • second install the packages
    pip3 install -r requirements.txt
    or
    pip install -r requirements.txt
    • run the code python3 gpt_vuln.py <> or if windows run python gpt_vuln.py <>

    Supported in both windows and linux

    Understanding the code

    Profiles:

    Parameter Return data Description Nmap Command
    p1 json Effective Scan -Pn -sV -T4 -O -F
    p2 json Simple Scan -Pn -T4 -A -v
    p3 json Low Power Scan -Pn -sS -sU -T4 -A -v
    p4 json Partial Intense Scan -Pn -p- -T4 -A -v
    p5 json Complete Intense Scan -Pn -sS -sU -T4 -A -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 --script=vuln

    The profile is the type of scan that will be executed by the nmap subprocess. The Ip or target will be provided via argparse. At first the custom nmap scan is run which has all the curcial arguments for the scan to continue. nextly the scan data is extracted from the huge pile of data which has been driven by nmap. the "scan" object has a list of sub data under "tcp" each labled according to the ports opened. once the data is extracted the data is sent to openai API davenci model via a prompt. the prompt specifically asks for an JSON output and the data also to be used in a certain manner.

    The entire structure of request that has to be sent to the openai API is designed in the completion section of the Program.

    vulnerability analysis of {} and return a vulnerabilty report in json".format(analize) # A structure for the request completion = openai.Completion.create( engine=model_engine, prompt=prompt, max_tokens=1024, n=1, stop=None, ) response = completion.choices[0].text return response" dir="auto">
    def profile(ip):
    nm.scan('{}'.format(ip), arguments='-Pn -sS -sU -T4 -A -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 --script=vuln')
    json_data = nm.analyse_nmap_xml_scan()
    analize = json_data["scan"]
    # Prompt about what the quary is all about
    prompt = "do a vulnerability analysis of {} and return a vulnerabilty report in json".format(analize)
    # A structure for the request
    completion = openai.Completion.create(
    engine=model_engine,
    prompt=prompt,
    max_tokens=1024,
    n=1,
    stop=None,
    )
    response = completion.choices[0].text
    return response

    Advantages

    • Can be used in developing a more advanced systems completly made of the API and scanner combination
    • Can increase the effectiveness of the final system
    • Highly productive when working with models such as GPT3


    ❌