Sn1per Community Edition by @xer0dayz - https://xerosecurity.com
This commit is contained in:
172
README.md
172
README.md
@@ -7,38 +7,36 @@
|
||||
[](https://twitter.com/intent/tweet?original_referer=https%3A%2F%2Fdeveloper.twitter.com%2Fen%2Fdocs%2Ftwitter-for-websites%2Ftweet-button%2Foverview&ref_src=twsrc%5Etfw&text=Sn1per%20-%20Automated%20Pentest%20Recon%20Scanner&tw_p=tweetbutton&url=https%3A%2F%2Fgithub.com%2F1N3%2FSn1per)
|
||||
[](https://twitter.com/intent/follow?screen_name=xer0dayz)
|
||||
|
||||
[](https://www.youtube.com/watch?v=YlRRNM3vd8k)
|
||||
|
||||
## ABOUT:
|
||||
Sn1per Community Edition is an automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities. Sn1per Professional is Xero Security's premium reporting addon for Professional Penetration Testers, Bug Bounty Researchers and Corporate Security teams to manage large environments and pentest scopes. For more information regarding Sn1per Professional, go to https://xerosecurity.com.
|
||||
|
||||
## SN1PER PROFESSIONAL FEATURES:
|
||||
### Workspace Navigator
|
||||
- [x] Easily navigate all workspaces within Sn1per
|
||||

|
||||
### Workspace Dashboard
|
||||
- [x] Get a high level view of the attack surface with overall scan progress
|
||||

|
||||
### Slideshow
|
||||
- [x] Visualize the attack surface by easily flipping through all gathered screenshots
|
||||
### Slideshow for all gathered screenshots
|
||||

|
||||
### Host List
|
||||
- [x] Easily search and sort through all hosts within the workspace using various meta properties
|
||||

|
||||
### Detailed Host Reports
|
||||
- [x] Get more details on any host within the workspace.
|
||||

|
||||
### NMap HTML Reports
|
||||
- [x] View low level network information on each host
|
||||
### Searchable and sortable DNS, IP and open port database
|
||||

|
||||
### Detailed host reports
|
||||

|
||||
### NMap HTML host reports
|
||||

|
||||
### Demo Video:
|
||||
[](https://www.youtube.com/watch?v=YlRRNM3vd8k)
|
||||
### Purchase Sn1per Professional:
|
||||
### Quick links to online recon tools and Google hacking queries
|
||||

|
||||
### Takeovers and Email Security
|
||||

|
||||
### HTML5 Notepad
|
||||

|
||||
### Demo:
|
||||
[](https://asciinema.org/a/IDckE48BNSWQ8TV8yEjJjjMNm)
|
||||
|
||||
## ORDER SN1PER PROFESSIONAL:
|
||||
To obtain a Sn1per Professional license, go to https://xerosecurity.com.
|
||||
|
||||
## SN1PER COMMUNITY FEATURES:
|
||||
- [x] Automatically collects basic recon (ie. whois, ping, DNS, etc.)
|
||||
- [x] Automatically launches Google hacking queries against a target domain
|
||||
- [x] Automatically enumerates open ports via NMap port scanning
|
||||
- [x] Automatically exploit common vulnerabilities
|
||||
- [x] Automatically brute forces sub-domains, gathers DNS info and checks for zone transfers
|
||||
- [x] Automatically checks for sub-domain hijacking
|
||||
- [x] Automatically runs targeted NMap scripts against open ports
|
||||
@@ -52,18 +50,53 @@ To obtain a Sn1per Professional license, go to https://xerosecurity.com.
|
||||
- [x] Automatically enumerate SSL/TLS ciphers, protocols and vulnerabilities
|
||||
- [x] Automatically enumerate SNMP community strings, services and users
|
||||
- [x] Automatically list SMB users and shares, check for NULL sessions and exploit MS08-067
|
||||
- [x] Automatically exploit vulnerable JBoss, Java RMI and Tomcat servers
|
||||
- [x] Automatically tests for open X11 servers
|
||||
- [x] Auto-pwn added for Metasploitable, ShellShock, MS08-067, Default Tomcat Creds
|
||||
- [x] Performs high level enumeration of multiple hosts and subnets
|
||||
- [x] Automatically integrates with Metasploit Pro, MSFConsole and Zenmap for reporting
|
||||
- [x] Automatically gathers screenshots of all web sites
|
||||
- [x] Create individual workspaces to store all scan output
|
||||
- [x] Scheduled scans (daily, weekly, monthly)
|
||||
- [x] Slack API integration (https://github.com/1N3/Sn1per/wiki/Slack-API-Integration)
|
||||
- [x] Hunter.io API integration (https://github.com/1N3/Sn1per/wiki/Hunter.io-API-Integration)
|
||||
- [x] OpenVAS API integration (https://github.com/1N3/Sn1per/wiki/OpenVAS-Integration)
|
||||
- [x] Burpsuite Professional 2.x integration (https://github.com/1N3/Sn1per/wiki/Burpsuite-Professional-2.x-Integration)
|
||||
- [x] Censys API integration (https://github.com/1N3/Sn1per/wiki/Censys-API-Integration)
|
||||
- [x] Metasploit integration (https://github.com/1N3/Sn1per/wiki/Metasploit-Integration)
|
||||
|
||||
## EXPLOITS:
|
||||
- [x] Cisco IKE PSK Disclosure
|
||||
- [x] Drupal RESTful Web Services unserialize() SA-CORE-2019-003
|
||||
- [x] Apache Struts: S2-057 (CVE-2018-11776): Security updates available for Apache Struts
|
||||
- [x] Drupal: CVE-2018-7600: Remote Code Execution - SA-CORE-2018-002
|
||||
- [x] GPON Routers - Authentication Bypass / Command Injection CVE-2018-10561
|
||||
- [x] MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption
|
||||
- [x] Apache Tomcat: Remote Code Execution (CVE-2017-12617)
|
||||
- [x] Oracle WebLogic wls-wsat Component Deserialization Remote Code Execution CVE-2017-10271
|
||||
- [x] Apache Struts Content-Type arbitrary command execution (CVE-2017-5638)
|
||||
- [x] Apache Struts 2 Framework Checks - REST plugin with XStream handler (CVE-2017-9805)
|
||||
- [x] Apache Struts Content-Type arbitrary command execution (CVE-2017-5638)
|
||||
- [x] Microsoft IIS WebDav ScStoragePathFromUrl Overflow CVE-2017-7269
|
||||
- [x] ManageEngine Desktop Central 9 FileUploadServlet ConnectionId Vulnerability CVE-2015-8249
|
||||
- [x] MS15-034 HTTP.sys Memory Leak
|
||||
- [x] Shellshock Bash Shell remote code execution CVE-2014-6271
|
||||
- [x] HeartBleed OpenSSL Detection CVE-2014-0160
|
||||
- [x] MS12-020: Vulnerabilities in Remote Desktop Could Allow Remote Code Execution (2671387)
|
||||
- [x] Tomcat Application Manager Default Ovwebusr Password Vulnerability CVE-2009-3843
|
||||
- [x] MS08-067 Microsoft Server Service Relative Path Stack Corruption
|
||||
- [x] Webmin File Disclosure CVE-2006-3392
|
||||
- [x] VsFTPd 2.3.4 Backdoor
|
||||
- [x] ProFTPd 1.3.3C Backdoor
|
||||
- [x] MS03-026 Microsoft RPC DCOM Interface Overflow
|
||||
- [x] DistCC Daemon Command Execution
|
||||
- [x] JBoss Java De-Serialization
|
||||
- [x] HTTP Writable Path PUT/DELETE File Access
|
||||
- [x] Apache Tomcat User Enumeration
|
||||
- [x] Tomcat Application Manager Login Bruteforce
|
||||
- [x] Jenkins-CI Enumeration
|
||||
- [x] HTTP WebDAV Scanner
|
||||
- [x] Android Insecure ADB
|
||||
- [x] Anonymous FTP Access
|
||||
- [x] PHPMyAdmin Backdoor
|
||||
- [x] PHPMyAdmin Auth Bypass
|
||||
- [x] OpenSSH User Enumeration
|
||||
- [x] LibSSH Auth Bypass
|
||||
- [x] SMTP User Enumeration
|
||||
- [x] Public NFS Mounts
|
||||
|
||||
## KALI LINUX INSTALL:
|
||||
```
|
||||
@@ -88,8 +121,8 @@ docker run -it sn1per-docker /bin/bash
|
||||
[*] NORMAL MODE
|
||||
sniper -t <TARGET>
|
||||
|
||||
[*] NORMAL MODE + OSINT + RECON + FULL PORT SCAN + BRUTE FORCE
|
||||
sniper -t <TARGET> -o -re -fp -b
|
||||
[*] NORMAL MODE + OSINT + RECON
|
||||
sniper -t <TARGET> -o -re
|
||||
|
||||
[*] STEALTH MODE + OSINT + RECON
|
||||
sniper -t <TARGET> -m stealth -o -re
|
||||
@@ -97,47 +130,50 @@ sniper -t <TARGET> -m stealth -o -re
|
||||
[*] DISCOVER MODE
|
||||
sniper -t <CIDR> -m discover -w <WORSPACE_ALIAS>
|
||||
|
||||
[*] FLYOVER MODE
|
||||
sniper -t <TARGET> -m flyover -w <WORKSPACE_ALIAS>
|
||||
|
||||
[*] AIRSTRIKE MODE
|
||||
sniper -f /full/path/to/targets.txt -m airstrike
|
||||
|
||||
[*] NUKE MODE WITH TARGET LIST, BRUTEFORCE ENABLED, FULLPORTSCAN ENABLED, OSINT ENABLED, RECON ENABLED, WORKSPACE & LOOT ENABLED
|
||||
sniper -f /full/path/to/targets.txt -m nuke -w <WORKSPACE_ALIAS>
|
||||
|
||||
[*] SCAN ONLY SPECIFIC PORT
|
||||
sniper -t <TARGET> -m port -p <portnum>
|
||||
|
||||
[*] FULLPORTONLY SCAN MODE
|
||||
sniper -t <TARGET> -fp
|
||||
|
||||
[*] PORT SCAN MODE
|
||||
sniper -t <TARGET> -m port -p <PORT_NUM>
|
||||
|
||||
[*] WEB MODE - PORT 80 + 443 ONLY!
|
||||
sniper -t <TARGET> -m web
|
||||
|
||||
[*] HTTP WEB PORT HTTP MODE
|
||||
[*] HTTP WEB PORT MODE
|
||||
sniper -t <TARGET> -m webporthttp -p <port>
|
||||
|
||||
[*] HTTPS WEB PORT HTTPS MODE
|
||||
[*] HTTPS WEB PORT MODE
|
||||
sniper -t <TARGET> -m webporthttps -p <port>
|
||||
|
||||
[*] WEBSCAN MODE
|
||||
sniper -t <TARGET> -m webscan
|
||||
|
||||
[*] VULNSCAN MODE
|
||||
sniper -t <TARGET> -m vulnscan
|
||||
[*] HTTP WEBSCAN MODE
|
||||
sniper -t <TARGET> -m webscan
|
||||
|
||||
[*] ENABLE BRUTEFORCE
|
||||
sniper -t <TARGET> -b
|
||||
|
||||
[*] LOOT REIMPORT FUNCTION
|
||||
sniper -w <WORKSPACE_ALIAS> --reimport
|
||||
[*] AIRSTRIKE MODE
|
||||
sniper -f targets.txt -m airstrike
|
||||
|
||||
[*] LOOT REIMPORTALL FUNCTION
|
||||
sniper -w <WORKSPACE_ALIAS> --reimportall
|
||||
[*] NUKE MODE WITH TARGET LIST, BRUTEFORCE ENABLED, FULLPORTSCAN ENABLED, OSINT ENABLED, RECON ENABLED, WORKSPACE & LOOT ENABLED
|
||||
sniper -f targets.txt -m nuke -w <WORKSPACE_ALIAS>
|
||||
|
||||
[*] MASS PORT SCAN MODE
|
||||
sniper -f targets.txt -m massportscan
|
||||
|
||||
[*] MASS WEB SCAN MODE
|
||||
sniper -f targets.txt -m massweb
|
||||
|
||||
[*] MASS WEBSCAN SCAN MODE
|
||||
sniper -f targets.txt -m masswebscan
|
||||
|
||||
[*] MASS VULN SCAN MODE
|
||||
sniper -f targets.txt -m massvulnscan
|
||||
|
||||
[*] PORT SCAN MODE
|
||||
sniper -t <TARGET> -m port -p <PORT_NUM>
|
||||
|
||||
[*] LIST WORKSPACES
|
||||
sniper --list
|
||||
|
||||
[*] DELETE WORKSPACE
|
||||
sniper -w <WORKSPACE_ALIAS> -d
|
||||
@@ -145,12 +181,21 @@ sniper -w <WORKSPACE_ALIAS> -d
|
||||
[*] DELETE HOST FROM WORKSPACE
|
||||
sniper -w <WORKSPACE_ALIAS> -t <TARGET> -dh
|
||||
|
||||
[*] SCHEDULED SCANS'
|
||||
sniper -w <WORKSPACE_ALIAS> -s daily|weekly|monthly'
|
||||
|
||||
[*] SCAN STATUS
|
||||
[*] GET SNIPER SCAN STATUS
|
||||
sniper --status
|
||||
|
||||
[*] LOOT REIMPORT FUNCTION
|
||||
sniper -w <WORKSPACE_ALIAS> --reimport
|
||||
|
||||
[*] LOOT REIMPORTALL FUNCTION
|
||||
sniper -w <WORKSPACE_ALIAS> --reimportall
|
||||
|
||||
[*] LOOT REIMPORT FUNCTION
|
||||
sniper -w <WORKSPACE_ALIAS> --reload
|
||||
|
||||
[*] SCHEDULED SCANS
|
||||
sniper -w <WORKSPACE_ALIAS> -s daily|weekly|monthly
|
||||
|
||||
[*] UPDATE SNIPER
|
||||
sniper -u|--update
|
||||
```
|
||||
@@ -164,15 +209,30 @@ sniper -u|--update
|
||||
* **DISCOVER:** Parses all hosts on a subnet/CIDR (ie. 192.168.0.0/16) and initiates a sniper scan against each host. Useful for internal network scans.
|
||||
* **PORT:** Scans a specific port for vulnerabilities. Reporting is not currently available in this mode.
|
||||
* **FULLPORTONLY:** Performs a full detailed port scan and saves results to XML.
|
||||
* **MASSPORTSCAN:** Runs a "fullportonly" scan on mutiple targets specifified via the "-f" switch.
|
||||
* **WEB:** Adds full automatic web application scans to the results (port 80/tcp & 443/tcp only). Ideal for web applications but may increase scan time significantly.
|
||||
* **MASSWEB:** Runs "web" mode scans on mutiple targets specifified via the "-f" switch.
|
||||
* **WEBPORTHTTP:** Launches a full HTTP web application scan against a specific host and port.
|
||||
* **WEBPORTHTTPS:** Launches a full HTTPS web application scan against a specific host and port.
|
||||
* **WEBSCAN:** Launches a full HTTP & HTTPS web application scan against via Burpsuite and Arachni.
|
||||
* **MASSWEBSCAN:** Runs "webscan" mode scans of multiple targets specified via the "-f" switch.
|
||||
* **VULNSCAN:** Launches a OpenVAS vulnerability scan.
|
||||
* **MASSVULNSCAN:** Launches a "vulnscan" mode scans on mutiple targets specifified via the "-f" switch.
|
||||
|
||||
## SAMPLE REPORT:
|
||||
https://gist.github.com/1N3/8214ec2da2c91691bcbc
|
||||
|
||||
## Help Topics
|
||||
|
||||
- [x] Burpsuite Professional 2.x integration (https://github.com/1N3/Sn1per/wiki/Burpsuite-Professional-2.x-Integration)
|
||||
- [x] Censys API integration (https://github.com/1N3/Sn1per/wiki/Censys-API-Integration)
|
||||
- [x] Hunter.io API integration (https://github.com/1N3/Sn1per/wiki/Hunter.io-API-Integration)
|
||||
- [x] Metasploit integration (https://github.com/1N3/Sn1per/wiki/Metasploit-Integration)
|
||||
- [x] OpenVAS API integration (https://github.com/1N3/Sn1per/wiki/OpenVAS-Integration)
|
||||
- [x] Scheduled scans (https://github.com/1N3/Sn1per/wiki/Scheduled-Scans)
|
||||
- [x] Slack API integration (https://github.com/1N3/Sn1per/wiki/Slack-API-Integration)
|
||||
- [x] Sn1per Configuration Options (https://github.com/1N3/Sn1per/wiki/Sn1per-Configuration-Options)
|
||||
|
||||
## LICENSE:
|
||||
This software is free to distribute, modify and use with the condition that credit is provided to the creator (@xer0dayz @XeroSecurity) and is not for commercial use or resold and rebranded. Permission to distribute any part of the code for sale is strictly prohibited.
|
||||
|
||||
|
||||
Reference in New Issue
Block a user