Sn1per by 1N3 @CrowdShield

This commit is contained in:
root
2016-04-24 20:23:51 -07:00
parent 800d2b9d85
commit 932ec1431b
3 changed files with 38 additions and 26 deletions

View File

@@ -48,6 +48,8 @@ https://gist.github.com/1N3/8214ec2da2c91691bcbc
```
## CHANGELOG:
* v1.6e - Added reporting option for nobrute mode (CC. @mero01)
* v1.6e - Improved SMB scan performance/optimization added
* v1.6d - Improved NMap scan performance options
* v1.6d - Added xprobe2 OS finger printing tool
* v1.6d - Added jexbos JBoss autopwn

View File

@@ -31,7 +31,7 @@ gem install rake
gem install ruby-nmap net-http-persistent mechanize text-table
echo -e "$OKORANGE + -- --=[Cleaning up old extensions...$RESET"
rm -Rf Findsploit/ Brutex/ Goohak/ XSSTracer/ MassBleed/ SuperMicro-Password-Scanner/ CMSmap/ yasuo/ Sublist3r/ shocker/
rm -Rf Findsploit/ Brutex/ Goohak/ XSSTracer/ MassBleed/ SuperMicro-Password-Scanner/ CMSmap/ yasuo/ Sublist3r/ shocker/ jexboss/ CrackMapExec/
echo -e "$OKORANGE + -- --=[Downloading extensions...$RESET"
git clone https://github.com/1N3/Findsploit.git
@@ -46,6 +46,7 @@ git clone https://github.com/johndekroon/serializekiller.git
git clone https://github.com/aboul3la/Sublist3r.git
git clone https://github.com/nccgroup/shocker.git
git clone https://github.com/joaomatosf/jexboss.git
git clone https://github.com/byt3bl33d3r/CrackMapExec.git
echo -e "$OKORANGE + -- --=[Setting up environment...$RESET"
mkdir loot 2> /dev/null

59
sniper
View File

@@ -29,7 +29,7 @@
# ./sniper <targets.txt> nuke <report>
#
# UNCOMMENT AND SET TARGET DIR FOR UNIVERSAL ACCESS (ie. sniper <target>)
# cd /pentest/web/Sn1per/
#cd /pentest/web/Sn1per/
clear
@@ -89,9 +89,15 @@ if [ "$MODE" = "web" ]; then
fi
fi
if [ "$MODE" = "nobrute" ]; then
if [ "$OPT1" = "report" ]; then
./sniper $TARGET $MODE | tee ./loot/sniper-$TARGET-$MODE-`date +%Y%m%d%H%M`.txt 2>&1
fi
fi
if [ "$MODE" = "stealth" ]; then
if [ "$OPT1" = "report" ]; then
./sniper $TARGET $MODE | tee ./loot/sniper-$MODE-`date +%Y%m%d%H%M`.txt 2>&1
./sniper $TARGET $MODE | tee ./loot/sniper-$TARGET-$MODE-`date +%Y%m%d%H%M`.txt 2>&1
exit
fi
echo -e "$OKRED ____ $RESET"
@@ -151,7 +157,7 @@ if [ "$MODE" = "stealth" ]; then
fi
echo ""
echo -e "$OKGREEN################################### Running passive scans #########################$RESET"
unicornscan $TARGET 2> /dev/null
unicornscan $TARGET:21,22,23,25,53,79,80,110,111,135,139,162,389,443,445,512,513,514,1099,1524,2049,2121,3306,3389,3632,5432,5800,5900,6667,8000,8009,8080,8180,8443,10000,49152 2> /dev/null
xprobe2 $TARGET
wafw00f http://$TARGET
whatweb http://$TARGET
@@ -207,45 +213,42 @@ if [ "$MODE" = "airstrike" ]; then
echo -e "$OKGREEN################################### Running recon #################################$RESET"
nslookup $a
host $a
if [[ ${a:0:1} =~ $REGEX ]];
then
SCAN_TYPE="IP"
else
SCAN_TYPE="DOMAIN"
fi
if [ $SCAN_TYPE == "DOMAIN" ];
then
dig -x $a
whois $a
theharvester -d $TARGET -l 200 -b all -v -t 2> /dev/null
theharvester -d $a -l 200 -b all -v -t 2> /dev/null
dnsrecon -d $a
dnsrecon -d $a -t zonewalk
dnsrecon -d $a -t axfr
dnsenum $a -f BruteX/wordlists/namelist.txt
mv -f *_ips.txt loot/ 2>/dev/null
python Sublist3r/sublist3r.py -d $TARGET -vvv 2>/dev/null
python Sublist3r/sublist3r.py -d $a -vvv 2>/dev/null
fi
echo ""
echo -e "$OKGREEN################################### Running passive scans #########################$RESET"
unicornscan $a 2> /dev/null
xprobe2 $TARGET
unicornscan $a:21,22,23,25,53,79,80,110,111,135,139,162,389,443,445,512,513,514,1099,1524,2049,2121,3306,3389,3632,5432,5800,5900,6667,8000,8009,8080,8180,8443,10000,49152 2> /dev/null
xprobe2 $a
wafw00f http://$a
whatweb http://$a
xsstracer $a 80
sslscan --no-failed $a
cutycapt --url=http://$TARGET --out=loot/$TARGET-port80.jpg
cutycapt --url=http://$a --out=loot/$a-port80.jpg
echo -e "$OKGREEN################################### Done! #########################################$RESET"
clear
exit
done;
exit
fi
if [ "$MODE" = "port" ]; then
echo -e "$OKRED ____ $RESET"
echo -e "$OKRED _________ / _/___ ___ _____$RESET"
echo -e "$OKRED / ___/ __ \ / // __ \/ _ \/ ___/$RESET"
echo -e "$OKRED (__ ) / / // // /_/ / __/ / $RESET"
echo -e "$OKRED /____/_/ /_/___/ .___/\___/_/ $RESET"
echo -e "$OKRED /_/ $RESET"
echo -e "$RESET"
echo -e "$OKORANGE + -- --=[http://crowdshield.com"
echo -e "$OKORANGE + -- --=[sn1per v1.6 by 1N3"
echo -e "$RESET"
if [ -z "$OPT1" ]; then
echo -e "$OKRED + -- --=[Error: You need to enter a port number. $RESET"
exit
@@ -308,15 +311,17 @@ echo ""
echo -e "$OKGREEN################################### Pinging host ###################################$RESET"
ping -c 1 $TARGET
echo ""
echo -e "$OKGREEN################################### Running port scan ##############################$RESET"
echo -e "$OKGREEN################################### Running TCP port scan ##########################$RESET"
if [ -z "$OPT1" ]; then
nmap -sV -T5 -A --open -p 21,22,23,25,53,79,80,110,111,135,139,162,389,443,445,512,513,514,1099,1524,2049,2121,3306,3389,3632,5432,5800,5900,6667,8000,8009,8080,8180,8443,10000,49152 $TARGET -oX $LOOT_DIR/nmap-$TARGET.xml
nmap -sU -sV -T5 -A -p U:53,U:67,U:68,U:88,U:161,U:162,U:137,U:138,U:139,U:389,U:520,U:2049 --open $TARGET
nmap -T5 --open -p 21,22,23,25,53,79,80,110,111,135,139,162,389,443,445,512,513,514,1099,1524,2049,2121,3306,3389,3632,5432,5800,5900,6667,8000,8009,8080,8180,8443,10000,49152 $TARGET -oX $LOOT_DIR/nmap-$TARGET.xml
echo -e "$OKGREEN################################### Running UDP port scan ##########################$RESET"
nmap -T5 --open -p U:53,U:67,U:68,U:88,U:161,U:162,U:137,U:138,U:139,U:389,U:520,U:2049 $TARGET
elif [ "$OPT1" == "web" ]; then
nmap -sV -T5 -A -p 80,443 --open $TARGET -oX $LOOT_DIR/nmap-$TARGET.xml
nmap -sV -T5 -p 80,443 --open $TARGET -oX $LOOT_DIR/nmap-$TARGET.xml
else
nmap -sV -T5 -A -p $OPT1 --open $TARGET -oX $LOOT_DIR/nmap-$TARGET.xml
nmap -sU -sV -T5 -A -p U:$OPT1 --open $TARGET
nmap -T5 -p $OPT1 --open $TARGET -oX $LOOT_DIR/nmap-$TARGET.xml
echo -e "$OKGREEN################################### Running UDP port scan ##########################$RESET"
nmap -sU -T5 -p U:$OPT1 --open $TARGET
fi
echo ""
echo -e "$OKGREEN################################### Running Intrusive Scans ########################$RESET"
@@ -533,6 +538,7 @@ then
echo -e "$OKRED+ -- --=[Port 139 closed... skipping.$RESET"
else
echo -e "$OKGREEN+ -- --=[Port 139 opened... running tests...$RESET"
SMB="1"
enum4linux $TARGET
python $SAMRDUMP $TARGET
nbtscan $TARGET
@@ -647,6 +653,9 @@ fi
if [ -z "$port_445" ]
then
echo -e "$OKRED+ -- --=[Port 445 closed... skipping.$RESET"
elif [ $SMB = "1" ]
then
echo -e "$OKRED+ -- --=[Port 445 scanned... skipping.$RESET"
else
echo -e "$OKGREEN+ -- --=[Port 445 opened... running tests...$RESET"
enum4linux $TARGET