Difference between revisions of "Kali tools"

From RHS Wiki
Jump to navigation Jump to search
(Created page with "== patator == <nowiki>Patator v0.5 (http://code.google.com/p/patator/) Usage: patator.py module --help Available modules: + ftp_login : Brute-force FTP + ssh_login...")
 
Tag: visualeditor
 
(35 intermediate revisions by the same user not shown)
Line 1: Line 1:
== patator ==
+
[http://tools.kali.org/tools-listing Tools list]
 +
==crunch==
 +
Word list creation. Example:
 +
crunch 6 6 + + + + -o 6charcapslowernumber.txt
 +
generates: 6 char pwd list, lowercase, uppercase and numbers<br />
 +
+ = wildchar, order is: lower, caps, numbers, special chars<br />
 +
-o --> output file<br />
 +
 
 +
==Examples==
 +
 +
<syntaxhighlight lang="bash">
 +
crunch 8 8 -f /usr/share/rainbowcrack/charset.txt loweralpha-numeric  -o loweralpha-numeric_8_8.lst
 +
 
 +
crunch 8 10 -f /usr/share/rainbowcrack/charset.txt mixalpha-numericdot -d 1@ -d 1, -d 1% | parallel -j6 python wallet_bruteforce_simple.py
 +
</syntaxhighlight>
 +
 
 +
===Charsets (-f)===
 +
crunch 8 8 -f /usr/share/rainbowcrack/charset.txt mixalpha -o /root/alphawordlist.lst
 +
charset.txt:
 +
<nowiki>
 +
numeric            = [0123456789]
 +
 +
alpha              = [ABCDEFGHIJKLMNOPQRSTUVWXYZ]
 +
alpha-numeric      = [ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789]
 +
 +
loweralpha        = [abcdefghijklmnopqrstuvwxyz]
 +
loweralpha-numeric = [abcdefghijklmnopqrstuvwxyz0123456789]
 +
 +
mixalpha          = [abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ]
 +
mixalpha-numeric  = [abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789]
 +
 +
ascii-32-95                  = [ !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~]
 +
ascii-32-65-123-4            = [ !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`{|}~]
 +
alpha-numeric-symbol32-space = [ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789!@#$%^&*()-_+=~`[]{}|\:;"'<>,.?/ ]</nowiki>
 +
Specifiying charsets on command line:
 +
crunch 6 6 0123456789ABCDEF
 +
escape char: \
 +
ABC\!\@\#\$
 +
 
 +
===Patterns (-t)===
 +
crunch 8 8 -t @@@@@@56 -o /root/birthdaywordlist.lst
 +
-t <pattern> = Giving crunch the pattern @@@@@@56. This word generate passwords up to 8 characters (6 lower case variable and 4 fixed) long that all ended with 56.<br />
 +
<nowiki>
 +
      @  --  lower case alpha characters
 +
      ,  --  upper case alhpa characters
 +
      %  --  numeric characters
 +
    ^    --  special characters (including space)</nowiki>
 +
To specify diferent character set for @ follow this example where @ can be one of [123abcDEF]:
 +
crunch 8 8 123abcDEF -t TEST@@@@
 +
Enclose the character set whith "" if space is included
 +
crunch "123abcDEF " -t TEST@@@@
 +
 
 +
To escape @ in a pattern use -l:
 +
crunch 6 6 -t b@d%%% -l @
 +
crunch 8 8 -f charset.lst mixalpha -t pass@,%^ -l %^
 +
will treat @ as a fixed character
 +
 
 +
Pattern with limited characters:
 +
crunch 8 8 abcdef ABCDEF 12345 @#$%- -t @@,,%%^^
 +
crunch 8 8 abcdef + 12345 + -t @@,,%%^^
 +
 
 +
===Limits the number of duplicate characters (-d numbersymbol)===
 +
              Limits the number of duplicate characters.  -d 2@ limits the lower case alphabet to output like aab and aac.  aaa would not be generated  as
 +
              that  is 3 consecutive letters of a.  The format is number then symbol where number is the maximum number of consecutive characters and sym‐
 +
              bol is the symbol of the the character set you want to limit i.e. @,%^  See examples 17-19.
 +
 
 +
===Divided output (-b | -c)===
 +
crunch 6 6 0123456789 -b 1mb -o START
 +
Creates 1mb files<br />
 +
Size definition can be in: kb, mb, gb  or  kib, mib, gib (ib--> 1024 base; mb --> 1000 base)<br />
 +
-o START must be specified as it is
 +
 
 +
crunch 6 6 0123456789 -c 200000 -o START
 +
Divide into files with no more than 200000 lines
 +
 
 +
===Stop at certain word (-e)===
 +
crunch 6 6 -t %%%%%% -e 333333
 +
Creates 6 char numeric wordlist until 333333<br />
 +
 
 +
===Invert direction from left->wright to wright->left (-i)===
 +
 
 +
===Words/Characters permutations (-p | -q)===
 +
-p: command line<br />
 +
-q: file<br />
 +
Words permutations:
 +
crunch 1 1 -p bird cat dog
 +
Letter permutations:
 +
crunch 1 1 -p abcd
 +
-p MUST be the last switch
 +
 
 +
crunch 1 1 -q test.txt
 +
being test.txt a word list (1 word per line)
 +
 
 +
===Stop/Resume Wordlist creation (ctrl+c/... -r)===
 +
crunch 8 8 0123456789 -o test.txt
 +
Stop the creation with a Ctrl C, then restart with ;
 +
crunch 8 8 0123456789 -o test.txt -r
 +
Note: if -s was used it must be removed at the resume line
 +
 
 +
===Start from specific position (-s)===
 +
crunch 7 7 0123456789 -s 9670549 -o test.txt
 +
Will start at 9670549
 +
 
 +
===Piping Crunch===
 +
use: -u |
 +
crunch 8 8 -t %%%%%%%% -u | aircrack-ng -e SSID -w - /pathto/capfile.cap
 +
crunch 8 8 -t %%%%%%%% -u | cowpatty -f - -r /pathto/capfile.cap -s SSID
 +
crunch 8 8 -t %%%%%%%% -u | pyrit -i - -r /pathto/capfile.cap -e ESSID attack_passthrough
 +
 
 +
===Compressing (-z)===
 +
 
 +
*gzip (quick)
 +
*bzip
 +
*lzma (smallest)
 +
 
 +
crunch 6 6 -f charset.lst lalpha -o test.txt -z gzip
 +
crunch 6 6 -f charset.lst lalpha -o test.txt -z bzip2
 +
crunch 6 6 -f charset.lst lalpha -o test.txt -z lzma
 +
 
 +
==Hydra==
 +
 
 +
 
 +
===Website Bruteforce===
 +
hydra www.example.com -L /usr/share/wordlists/users.txt -P /usr/share/wordlists/passwords.txt -V -f http-get /members
 +
 
 +
===SSH bruteforce===
 +
hydra -s 22 -v -V -l root -P <path_to_wordlist> -e -ns -t 16 192.168.0.101 ssh
 +
 
 +
===RDP Bruteforce (Port: 3389)===
 +
hydra -t 2 -V -f -l administrator -P rockyou.txt rdp://10.28.0.196
 +
With ncrack
 +
ncrack -vv -U common.usr -P top50000.pwd -T 4 10.28.0.161:3389
 +
 
 +
==metagoofil==
 +
 
 +
python metagoofil.py –d www.victima.com –l 20 –f pdf –o out.html –t out-files”
 +
 
 +
-d = dominio de la victima<br />
 +
-l = numero de archives maximos a descargar<br />
 +
-f = tipo de archivos (pdf, doc, xls, all)<br />
 +
-o = como se guardara el resultado<br />
 +
-t = directorio que contendrá los archivos descargado<br />
 +
 
 +
==patator==
 
  <nowiki>Patator v0.5 (http://code.google.com/p/patator/)
 
  <nowiki>Patator v0.5 (http://code.google.com/p/patator/)
Usage: patator.py module --help
+
Usage: patator.py module --help
 +
 +
Available modules:
 +
  + ftp_login    : Brute-force FTP
 +
  + ssh_login    : Brute-force SSH
 +
  + telnet_login  : Brute-force Telnet
 +
  + smtp_login    : Brute-force SMTP
 +
  + smtp_vrfy    : Enumerate valid users using SMTP VRFY
 +
  + smtp_rcpt    : Enumerate valid users using SMTP RCPT TO
 +
  + finger_lookup : Enumerate valid users using Finger
 +
  + http_fuzz    : Brute-force HTTP
 +
  + pop_login    : Brute-force POP3
 +
  + pop_passd    : Brute-force poppassd (http://netwinsite.com/poppassd/)
 +
  + imap_login    : Brute-force IMAP4
 +
  + ldap_login    : Brute-force LDAP
 +
  + smb_login    : Brute-force SMB
 +
  + smb_lookupsid : Brute-force SMB SID-lookup
 +
  + vmauthd_login : Brute-force VMware Authentication Daemon
 +
  + mssql_login  : Brute-force MSSQL
 +
  + oracle_login  : Brute-force Oracle
 +
  + mysql_login  : Brute-force MySQL
 +
  + mysql_query  : Brute-force MySQL queries
 +
  + pgsql_login  : Brute-force PostgreSQL
 +
  + vnc_login    : Brute-force VNC
 +
  + dns_forward  : Forward lookup names
 +
  + dns_reverse  : Reverse lookup subnets
 +
  + snmp_login    : Brute-force SNMP v1/2/3
 +
  + unzip_pass    : Brute-force the password of encrypted ZIP files
 +
  + keystore_pass : Brute-force the password of Java keystore files
 +
  + tcp_fuzz      : Fuzz TCP services
 +
  + dummy_test    : Testing module
 +
</nowiki>
 +
==webscarab==
 +
==smali==
 +
<nowiki>
 +
usage: java -jar smali.jar [options] [--] [<smali-file>|folder]*
 +
assembles a set of smali files into a dex file
 +
  -?,--help                      prints the help message then exits. Specify twice for debug options
 +
  -a,--api-level <API_LEVEL>    The numeric api-level of the file to generate, e.g. 14 for ICS. If not
 +
                                specified, it defaults to 14 (ICS).
 +
  -o,--output <FILE>            the name of the dex file that will be written. The default is out.dex
 +
  -v,--version                  prints the version then exits
 +
  -x,--allow-odex-instructions  allow odex instructions to be compiled into the dex file. Only a few
 +
                                instructions are supported - the ones that can exist in a dead code path and
 +
                                not cause dalvik to reject the class
 +
</nowiki>
 +
==paros==
 +
Gui crawler
 +
==oscanner==
 +
  <nowiki>
 +
Oracle Scanner 1.0.6 by patrik@cqure.net
 +
--------------------------------------
 +
OracleScanner -s <ip> -r <repfile> [options]
 +
-s <servername>
 +
-f <serverlist>
 +
-P <portnr>
 +
-v be verbose
 +
</nowiki>
 +
==dirbuster==
 +
another bruteforce application
 +
 
 +
==dirb==
 +
Bruteforce URL's with wordlist
 +
dirb http://10.28.0.161/
 +
 
 +
==hash-identifier==
 +
==dbpwaudit==
 +
<nowiki> DBPwAudit v0.8 by Patrik Karlsson <patrik@cqure.net>
 +
----------------------------------------------------
 +
DBPwAudit -s <server> -d <db> -D <driver> -U <users> -P <passwords> [options]
 +
 +
-s - Server name or address.
 +
-p - Port of database server/instance.
 +
-d - Database/Instance name to audit.
 +
-D - The alias of the driver to use (-L for aliases)
 +
-U - File containing usernames to guess.
 +
-P - File containing passwords to guess.
 +
-L - List driver aliases.
 +
</nowiki>
 +
==casefile==
 +
 
 +
==Vulnerability Scan uniscan==
 +
<nowiki>
 +
  ####################################
 +
  # Uniscan project                  #
 +
  # http://uniscan.sourceforge.net/  #
 +
  ####################################
 +
  V. 6.2
 +
 +
 +
  OPTIONS:
 +
-h help
 +
-u <url> example: https://www.example.com/
 +
-f <file> list of url's
 +
-b Uniscan go to background
 +
-q Enable Directory checks
 +
-w Enable File checks
 +
-e Enable robots.txt and sitemap.xml check
 +
-d Enable Dynamic checks
 +
-s Enable Static checks
 +
-r Enable Stress checks
 +
-i <dork> Bing search
 +
-o <dork> Google search
 +
-g Web fingerprint
 +
-j Server fingerprint
 +
 
 +
  usage:
 +
  [1] perl ./uniscan.pl -u http://www.example.com/ -qweds
 +
  [2] perl ./uniscan.pl -f sites.txt -bqweds
 +
  [3] perl ./uniscan.pl -i uniscan
 +
  [4] perl ./uniscan.pl -i "ip:xxx.xxx.xxx.xxx"
 +
  [5] perl ./uniscan.pl -o "inurl:test"
 +
  [6] perl ./uniscan.pl -u https://www.example.com/ -r
 +
 +
  report saved to: /usr/share/uniscan/report/www.example.com.html</nowiki>
  
Available modules:
+
vega (GUI)
  + ftp_login    : Brute-force FTP
+
==Rebind==
  + ssh_login    : Brute-force SSH
+
IP rebind attack for routers<br />
  + telnet_login  : Brute-force Telnet
+
https://www.youtube.com/watch?v=0duYxPIx8gU<br />
  + smtp_login    : Brute-force SMTP
+
http://rebind.googlecode.com
  + smtp_vrfy    : Enumerate valid users using SMTP VRFY
+
<nowiki>
  + smtp_rcpt    : Enumerate valid users using SMTP RCPT TO
+
Rebind v0.3.4
  + finger_lookup : Enumerate valid users using Finger
+
  + http_fuzz    : Brute-force HTTP
+
Usage: rebind [OPTIONS]
  + pop_login    : Brute-force POP3
+
  + pop_passd    : Brute-force poppassd (http://netwinsite.com/poppassd/)
+
-i <interface> Specify the network interface to bind to
  + imap_login    : Brute-force IMAP4
+
-d <fqdn>    Specify your registered domain name
  + ldap_login    : Brute-force LDAP
+
-u <user>    Specify the Basic Authentication user name [admin]
  + smb_login    : Brute-force SMB
+
-a <pass>    Specify the Basic Authentication password [admin]
  + smb_lookupsid : Brute-force SMB SID-lookup
+
-r <path>    Specify the initial URL request path [/]
  + vmauthd_login : Brute-force VMware Authentication Daemon
+
-t <ip>      Specify a comma separated list of target IP addresses [client IP]
  + mssql_login  : Brute-force MSSQL
+
-n <time>    Specify the callback interval in milliseconds [2000]
  + oracle_login  : Brute-force Oracle
+
-p <port>    Specify the target port [80]
  + mysql_login  : Brute-force MySQL
+
-c <port>    Specify the callback port [81]
  + mysql_query  : Brute-force MySQL queries
+
-C <value>    Specify a cookie to set for the client
  + pgsql_login  : Brute-force PostgreSQL
+
-H <file>    Specify a file of HTTP headers for the client to send to the target</nowiki>
  + vnc_login    : Brute-force VNC
+
==websploit==
  + dns_forward  : Forward lookup names
+
[[Kali_Linux:_Wifi_Jamming|Wifi Jamming]]
  + dns_reverse  : Reverse lookup subnets
 
  + snmp_login    : Brute-force SNMP v1/2/3
 
  + unzip_pass    : Brute-force the password of encrypted ZIP files
 
  + keystore_pass : Brute-force the password of Java keystore files
 
  + tcp_fuzz      : Fuzz TCP services
 
  + dummy_test    : Testing module
 
</nowiki>
 

Latest revision as of 20:19, 7 February 2020

Tools list

crunch

Word list creation. Example:

crunch 6 6 + + + + -o 6charcapslowernumber.txt

generates: 6 char pwd list, lowercase, uppercase and numbers
+ = wildchar, order is: lower, caps, numbers, special chars
-o --> output file

Examples

crunch 8 8 -f /usr/share/rainbowcrack/charset.txt loweralpha-numeric  -o loweralpha-numeric_8_8.lst

crunch 8 10 -f /usr/share/rainbowcrack/charset.txt mixalpha-numericdot -d 1@ -d 1, -d 1% | parallel -j6 python wallet_bruteforce_simple.py

Charsets (-f)

crunch 8 8 -f /usr/share/rainbowcrack/charset.txt mixalpha -o /root/alphawordlist.lst

charset.txt:

 numeric            = [0123456789]
 
 alpha              = [ABCDEFGHIJKLMNOPQRSTUVWXYZ]
 alpha-numeric      = [ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789]
 
 loweralpha         = [abcdefghijklmnopqrstuvwxyz]
 loweralpha-numeric = [abcdefghijklmnopqrstuvwxyz0123456789]
 
 mixalpha           = [abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ]
 mixalpha-numeric   = [abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789]
 
 ascii-32-95                  = [ !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~]
 ascii-32-65-123-4            = [ !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`{|}~]
 alpha-numeric-symbol32-space = [ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789!@#$%^&*()-_+=~`[]{}|\:;"'<>,.?/ ]

Specifiying charsets on command line:

crunch 6 6 0123456789ABCDEF 

escape char: \

ABC\!\@\#\$

Patterns (-t)

crunch 8 8 -t @@@@@@56 -o /root/birthdaywordlist.lst

-t <pattern> = Giving crunch the pattern @@@@@@56. This word generate passwords up to 8 characters (6 lower case variable and 4 fixed) long that all ended with 56.

      @   --  lower case alpha characters
      ,   --   upper case alhpa characters
      %   --  numeric characters
     ^    --  special characters (including space)

To specify diferent character set for @ follow this example where @ can be one of [123abcDEF]:

crunch 8 8 123abcDEF -t TEST@@@@

Enclose the character set whith "" if space is included

crunch "123abcDEF " -t TEST@@@@

To escape @ in a pattern use -l:

crunch 6 6 -t b@d%%% -l @
crunch 8 8 -f charset.lst mixalpha -t pass@,%^ -l %^

will treat @ as a fixed character

Pattern with limited characters:

crunch 8 8 abcdef ABCDEF 12345 @#$%- -t @@,,%%^^
crunch 8 8 abcdef + 12345 + -t @@,,%%^^

Limits the number of duplicate characters (-d numbersymbol)

             Limits the number of duplicate characters.  -d 2@ limits the lower case alphabet to output like aab and aac.  aaa would not be generated  as
             that  is 3 consecutive letters of a.  The format is number then symbol where number is the maximum number of consecutive characters and sym‐
             bol is the symbol of the the character set you want to limit i.e. @,%^   See examples 17-19.

Divided output (-b | -c)

crunch 6 6 0123456789 -b 1mb -o START

Creates 1mb files
Size definition can be in: kb, mb, gb or kib, mib, gib (ib--> 1024 base; mb --> 1000 base)
-o START must be specified as it is

crunch 6 6 0123456789 -c 200000 -o START 

Divide into files with no more than 200000 lines

Stop at certain word (-e)

crunch 6 6 -t %%%%%% -e 333333

Creates 6 char numeric wordlist until 333333

Invert direction from left->wright to wright->left (-i)

Words/Characters permutations (-p | -q)

-p: command line
-q: file
Words permutations:

crunch 1 1 -p bird cat dog

Letter permutations:

crunch 1 1 -p abcd

-p MUST be the last switch

crunch 1 1 -q test.txt

being test.txt a word list (1 word per line)

Stop/Resume Wordlist creation (ctrl+c/... -r)

crunch 8 8 0123456789 -o test.txt

Stop the creation with a Ctrl C, then restart with ;

crunch 8 8 0123456789 -o test.txt -r

Note: if -s was used it must be removed at the resume line

Start from specific position (-s)

crunch 7 7 0123456789 -s 9670549 -o test.txt

Will start at 9670549

Piping Crunch

use: -u |

crunch 8 8 -t %%%%%%%% -u | aircrack-ng -e SSID -w - /pathto/capfile.cap
crunch 8 8 -t %%%%%%%% -u | cowpatty -f - -r /pathto/capfile.cap -s SSID
crunch 8 8 -t %%%%%%%% -u | pyrit -i - -r /pathto/capfile.cap -e ESSID attack_passthrough

Compressing (-z)

  • gzip (quick)
  • bzip
  • lzma (smallest)
crunch 6 6 -f charset.lst lalpha -o test.txt -z gzip
crunch 6 6 -f charset.lst lalpha -o test.txt -z bzip2
crunch 6 6 -f charset.lst lalpha -o test.txt -z lzma

Hydra

Website Bruteforce

hydra www.example.com -L /usr/share/wordlists/users.txt -P /usr/share/wordlists/passwords.txt -V -f http-get /members

SSH bruteforce

hydra -s 22 -v -V -l root -P <path_to_wordlist> -e -ns -t 16 192.168.0.101 ssh

RDP Bruteforce (Port: 3389)

hydra -t 2 -V -f -l administrator -P rockyou.txt rdp://10.28.0.196

With ncrack

ncrack -vv -U common.usr -P top50000.pwd -T 4 10.28.0.161:3389

metagoofil

python metagoofil.py –d www.victima.com –l 20 –f pdf –o out.html –t out-files”

-d = dominio de la victima
-l = numero de archives maximos a descargar
-f = tipo de archivos (pdf, doc, xls, all)
-o = como se guardara el resultado
-t = directorio que contendrá los archivos descargado

patator

Patator v0.5 (http://code.google.com/p/patator/)
 Usage: patator.py module --help
 
 Available modules:
   + ftp_login     : Brute-force FTP
   + ssh_login     : Brute-force SSH
   + telnet_login  : Brute-force Telnet
   + smtp_login    : Brute-force SMTP
   + smtp_vrfy     : Enumerate valid users using SMTP VRFY
   + smtp_rcpt     : Enumerate valid users using SMTP RCPT TO
   + finger_lookup : Enumerate valid users using Finger
   + http_fuzz     : Brute-force HTTP
   + pop_login     : Brute-force POP3
   + pop_passd     : Brute-force poppassd (http://netwinsite.com/poppassd/)
   + imap_login    : Brute-force IMAP4
   + ldap_login    : Brute-force LDAP
   + smb_login     : Brute-force SMB
   + smb_lookupsid : Brute-force SMB SID-lookup
   + vmauthd_login : Brute-force VMware Authentication Daemon
   + mssql_login   : Brute-force MSSQL
   + oracle_login  : Brute-force Oracle
   + mysql_login   : Brute-force MySQL
   + mysql_query   : Brute-force MySQL queries
   + pgsql_login   : Brute-force PostgreSQL
   + vnc_login     : Brute-force VNC
   + dns_forward   : Forward lookup names
   + dns_reverse   : Reverse lookup subnets
   + snmp_login    : Brute-force SNMP v1/2/3
   + unzip_pass    : Brute-force the password of encrypted ZIP files
   + keystore_pass : Brute-force the password of Java keystore files
   + tcp_fuzz      : Fuzz TCP services
   + dummy_test    : Testing module
 

webscarab

smali

 usage: java -jar smali.jar [options] [--] [<smali-file>|folder]*
 assembles a set of smali files into a dex file
  -?,--help                      prints the help message then exits. Specify twice for debug options
  -a,--api-level <API_LEVEL>     The numeric api-level of the file to generate, e.g. 14 for ICS. If not
                                 specified, it defaults to 14 (ICS).
  -o,--output <FILE>             the name of the dex file that will be written. The default is out.dex
  -v,--version                   prints the version then exits
  -x,--allow-odex-instructions   allow odex instructions to be compiled into the dex file. Only a few
                                 instructions are supported - the ones that can exist in a dead code path and
                                 not cause dalvik to reject the class
 

paros

Gui crawler

oscanner

 
 	Oracle Scanner 1.0.6 by patrik@cqure.net
 	--------------------------------------
 	OracleScanner -s <ip> -r <repfile> [options]
 		-s	<servername>
 		-f	<serverlist>
 		-P	<portnr>
 		-v	be verbose
 

dirbuster

another bruteforce application

dirb

Bruteforce URL's with wordlist

dirb http://10.28.0.161/

hash-identifier

dbpwaudit

 DBPwAudit v0.8 by Patrik Karlsson <patrik@cqure.net>
 ----------------------------------------------------
 DBPwAudit -s <server> -d <db> -D <driver> -U <users> -P <passwords> [options]
 
 	-s - Server name or address.
 	-p - Port of database server/instance.
 	-d - Database/Instance name to audit.
 	-D - The alias of the driver to use (-L for aliases)
 	-U - File containing usernames to guess.
 	-P - File containing passwords to guess.
 	-L - List driver aliases.
 

casefile

Vulnerability Scan uniscan

  ####################################
  # Uniscan project                  #
  # http://uniscan.sourceforge.net/  #
  ####################################
  V. 6.2
 
 
  OPTIONS:
 	-h 	help
 	-u 	<url> example: https://www.example.com/
 	-f 	<file> list of url's
 	-b 	Uniscan go to background
 	-q 	Enable Directory checks
 	-w 	Enable File checks
 	-e 	Enable robots.txt and sitemap.xml check
 	-d 	Enable Dynamic checks
 	-s 	Enable Static checks
 	-r 	Enable Stress checks
 	-i 	<dork> Bing search
 	-o 	<dork> Google search
 	-g 	Web fingerprint
 	-j 	Server fingerprint
  
  usage: 
  [1] perl ./uniscan.pl -u http://www.example.com/ -qweds
  [2] perl ./uniscan.pl -f sites.txt -bqweds
  [3] perl ./uniscan.pl -i uniscan
  [4] perl ./uniscan.pl -i "ip:xxx.xxx.xxx.xxx"
  [5] perl ./uniscan.pl -o "inurl:test"
  [6] perl ./uniscan.pl -u https://www.example.com/ -r
 
  report saved to: /usr/share/uniscan/report/www.example.com.html

vega (GUI)

Rebind

IP rebind attack for routers
https://www.youtube.com/watch?v=0duYxPIx8gU
http://rebind.googlecode.com

 Rebind v0.3.4
 
 Usage: rebind [OPTIONS]
 
 	-i <interface>	Specify the network interface to bind to
 	-d <fqdn>     	Specify your registered domain name
 	-u <user>     	Specify the Basic Authentication user name [admin]
 	-a <pass>     	Specify the Basic Authentication password [admin]
 	-r <path>     	Specify the initial URL request path [/]
 	-t <ip>       	Specify a comma separated list of target IP addresses [client IP]
 	-n <time>     	Specify the callback interval in milliseconds [2000]
 	-p <port>     	Specify the target port [80]
 	-c <port>     	Specify the callback port [81]
 	-C <value>    	Specify a cookie to set for the client
 	-H <file>     	Specify a file of HTTP headers for the client to send to the target

websploit

Wifi Jamming