Compare commits
13 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
d7432005c9 | ||
|
|
a352701707 | ||
|
|
4166dc6700 | ||
|
|
4251cd3479 | ||
|
|
51f7556a44 | ||
|
|
799ead64bb | ||
|
|
50e53b5f1e | ||
|
|
b13866c802 | ||
|
|
79b8e64c89 | ||
|
|
861c603c71 | ||
|
|
a4e8ef3983 | ||
|
|
1e68971255 | ||
|
|
3f556f2561 |
@@ -1,4 +1,12 @@
|
||||
## CHANGELOG:
|
||||
* v4.4 - Fixed issue with sniper nuke and airstrike modes not running.
|
||||
* v4.4 - Added improved SNMP checks via NMap/Metasploit.
|
||||
* v4.4 - Resolved dependency issue for nfs-common package.
|
||||
* v4.4 - Fixed bug in sniper -fp command switch.
|
||||
* v4.3 - Fixed bug in version info.
|
||||
* v4.2 - Fixed bad merge in 4.1 causing sniper to break.
|
||||
* v4.1 - Fixed a few bugs with various command line switches for airstrike and nuke modes.
|
||||
* v4.1 - Fixed issue with path relative file inclusion via the -f flag. You can now include just the local filename (sniper -f targets.txt).
|
||||
* v4.0 - Added new command switch options for all sniper scans (see --help for details)
|
||||
* v4.0 - Added HTML formatted report for all workspaces to display screenshots, headers, reports and open ports
|
||||
* v4.0 - Added optional scan options such as --recon, --osint, --fullportonly --bruteforce, etc. to selectively enable scan modules. (see --help for details)
|
||||
|
||||
11
TODO.md
11
TODO.md
@@ -1,19 +1,8 @@
|
||||
###TODO:
|
||||
|
||||
* Implement a module system for running specific commands/modules
|
||||
* Add checks to make sure all commands exist at startup. If not, refer to installer.
|
||||
* Add command line parsing of options/modes
|
||||
|
||||
sniper --target crowdshield.com --workspace crowdshield.com --report --bruteforce --web --recon --portscan
|
||||
sniper --target crowdshield.com --kalionly --offline --webportonly 443
|
||||
|
||||
* Create a sniper-kali release to only use base Kali image toolsets
|
||||
* Check if there's an active internet connection, if not, run offline mode
|
||||
* Add automatic reporting and workspace creation for all scans by default
|
||||
* Add proxy support for all scans
|
||||
* Create uninstall.sh script
|
||||
* Add AWS security checks
|
||||
* Look into adding aquatone
|
||||
* Look into adding gobuster
|
||||
* Update subdomain list with aquatone list
|
||||
* Increase thread count for file/dir brute force
|
||||
5
build.sh
Normal file
5
build.sh
Normal file
@@ -0,0 +1,5 @@
|
||||
#!/bin/bash
|
||||
# build script to push to github...
|
||||
git add *
|
||||
git commit -m 'Sn1per by 1N3CrowdShield'
|
||||
git push origin master
|
||||
6
install.sh
Normal file → Executable file
6
install.sh
Normal file → Executable file
@@ -37,12 +37,8 @@ cp -Rf $PWD/* $INSTALL_DIR 2> /dev/null
|
||||
cd $INSTALL_DIR
|
||||
|
||||
echo -e "$OKORANGE + -- --=[Installing package dependencies...$RESET"
|
||||
<<<<<<< HEAD
|
||||
apt-get install eyewitness nodejs wafw00f xdg-utils metagoofil clusterd ruby rubygems python dos2unix zenmap sslyze arachni aha libxml2-utils rpcbind uniscan xprobe2 cutycapt unicornscan host whois dirb dnsrecon curl nmap php php-curl hydra iceweasel wpscan sqlmap nbtscan enum4linux cisco-torch metasploit-framework theharvester dnsenum nikto smtp-user-enum whatweb sslscan amap
|
||||
apt-get install nfs-common eyewitness nodejs wafw00f xdg-utils metagoofil clusterd ruby rubygems python dos2unix zenmap sslyze arachni aha libxml2-utils rpcbind uniscan xprobe2 cutycapt unicornscan host whois dirb dnsrecon curl nmap php php-curl hydra iceweasel wpscan sqlmap nbtscan enum4linux cisco-torch metasploit-framework theharvester dnsenum nikto smtp-user-enum whatweb sslscan amap
|
||||
apt-get install waffit 2> /dev/null
|
||||
=======
|
||||
apt-get install xdg-utils metagoofil clusterd ruby rubygems python dos2unix zenmap sslyze arachni aha libxml2-utils rpcbind uniscan xprobe2 cutycapt unicornscan host whois dirb dnsrecon curl nmap php php-curl hydra iceweasel wpscan sqlmap nbtscan enum4linux cisco-torch metasploit-framework theharvester dnsenum nikto smtp-user-enum whatweb sslscan amap nfs-common wafw00f
|
||||
>>>>>>> f450b78b5f346ea41df0cf44a70092a0d6fc9050
|
||||
pip install dnspython colorama tldextract urllib3 ipaddress requests
|
||||
curl -o- https://raw.githubusercontent.com/creationix/nvm/v0.33.8/install.sh | bash
|
||||
|
||||
|
||||
104
sniper
104
sniper
@@ -3,7 +3,7 @@
|
||||
# + -- --=[http://crowdshield.com
|
||||
#
|
||||
|
||||
VER="4.0"
|
||||
VER="4.4"
|
||||
BROWSER="firefox" # SET DEFAULT BROWSER
|
||||
INSTALL_DIR="/usr/share/sniper"
|
||||
PLUGINS_DIR="/usr/share/sniper/plugins"
|
||||
@@ -217,6 +217,7 @@ case $key in
|
||||
shift # past argument
|
||||
;;
|
||||
-nl|--noloot)
|
||||
LOOT="0"
|
||||
NOLOOT="1"
|
||||
shift # past argument
|
||||
;;
|
||||
@@ -234,7 +235,7 @@ case $key in
|
||||
;;
|
||||
*) # unknown option
|
||||
POSITIONAL+=("$1") # save it in an array for later
|
||||
echo "Unknown scan option...refer to the help menu for usage details."
|
||||
echo "Unknown scan option $POSITIONAL...refer to the help menu for usage details."
|
||||
exit
|
||||
shift # past argument
|
||||
;;
|
||||
@@ -310,14 +311,14 @@ function loot {
|
||||
echo -e "$OKORANGE + -- --=[Generating HTML Report...$RESET"
|
||||
echo "<html><head><style>table, th, td { border: 1px solid black; max-width: 1000px; align: center; } pre { white-space: pre-wrap; /* Since CSS 2.1 */ white-space: -moz-pre-wrap; /* Mozilla, since 1999 */ white-space: -pre-wrap; /* Opera 4-6 */ white-space: -o-pre-wrap; /* Opera 7 */ word-wrap: break-word; /* Internet Explorer 5.5+ */ }</style></head>
|
||||
<body><center><img src="$INSTALL_DIR/sn1per-logo.png"></img><br>--= [ by 1N3@CrowdShield - <a href="https://crowdshield.com" target="_new">https://crowdshield.com</a> ] =--<p></p>
|
||||
<a href="$LOOT_DIR/aquatone" target="_new">aquatone</a>
|
||||
<a href="$LOOT_DIR/burpsuite" target="_new">burpsuite</a>
|
||||
<a href="$LOOT_DIR/domains" target="_new">domains</a>
|
||||
<a href="$LOOT_DIR/nmap" target="_new">nmap</a>
|
||||
<a href="$LOOT_DIR/notes" target="_new">notes</a>
|
||||
<a href="$LOOT_DIR/output" target="_new">output</a>
|
||||
<a href="$LOOT_DIR/reports" target="_new">reports</a>
|
||||
<a href="$LOOT_DIR/screenshots" target="_new">screenshots</a>
|
||||
<a href="$LOOT_DIR/aquatone" target="_new">aquatone</a>
|
||||
<a href="$LOOT_DIR/burpsuite" target="_new">burpsuite</a>
|
||||
<a href="$LOOT_DIR/domains" target="_new">domains</a>
|
||||
<a href="$LOOT_DIR/nmap" target="_new">nmap</a>
|
||||
<a href="$LOOT_DIR/notes" target="_new">notes</a>
|
||||
<a href="$LOOT_DIR/output" target="_new">output</a>
|
||||
<a href="$LOOT_DIR/reports" target="_new">reports</a>
|
||||
<a href="$LOOT_DIR/screenshots" target="_new">screenshots</a>
|
||||
<a href="$LOOT_DIR/web" target="_new">web</a> <p></p>
|
||||
<h3>Last Report</h3>
|
||||
<iframe/src=\"`ls -lhtr $LOOT_DIR/reports/*.html | tail -n 1 | awk '{print $9}'`\" width=\"1500\" height=\"1000\"></iframe><p></p>
|
||||
@@ -329,8 +330,8 @@ function loot {
|
||||
</center>
|
||||
<table align=\"center\">" > $LOOT_DIR/sniper-report.html
|
||||
|
||||
for a in `ls $LOOT_DIR/screenshots/`; do
|
||||
TARGET=`echo $a | cut -d- -f1`
|
||||
for a in `ls $LOOT_DIR/screenshots/`; do
|
||||
TARGET=`echo $a | cut -d- -f1`
|
||||
echo "<tr><td width=\"500\"><br><h2 align=\"center\">$a</h2><br><a href=\"$LOOT_DIR/screenshots/$a\" target=\"_new\"><img src=\"$LOOT_DIR/screenshots/$a\" align=\"center\" height=\"425\" width=\"500\"></img></a></td>" >> $LOOT_DIR/sniper-report.html
|
||||
echo "<td width=\"1000\"><pre>" >> $LOOT_DIR/sniper-report.html
|
||||
cat $LOOT_DIR/web/headers-http*-$TARGET.txt >> $LOOT_DIR/sniper-report.html
|
||||
@@ -428,9 +429,31 @@ fi
|
||||
|
||||
if [ "$MODE" = "web" ]; then
|
||||
if [ "$REPORT" = "1" ]; then
|
||||
sniper -t $TARGET -m $MODE --noreport | tee $LOOT_DIR/output/sniper-$TARGET-$MODE-`date +%Y%m%d%H%M`.txt 2>&1
|
||||
if [ ! -z "$WORKSPACE" ]; then
|
||||
args="$args -w $WORKSPACE"
|
||||
LOOT_DIR=$INSTALL_DIR/loot/workspace/$WORKSPACE
|
||||
echo -e "$OKBLUE[*] Saving loot to $LOOT_DIR [$RESET${OKGREEN}OK${RESET}$OKBLUE]$RESET"
|
||||
mkdir -p $LOOT_DIR 2> /dev/null
|
||||
mkdir $LOOT_DIR/domains 2> /dev/null
|
||||
mkdir $LOOT_DIR/screenshots 2> /dev/null
|
||||
mkdir $LOOT_DIR/nmap 2> /dev/null
|
||||
mkdir $LOOT_DIR/notes 2> /dev/null
|
||||
mkdir $LOOT_DIR/burpsuite 2> /dev/null
|
||||
mkdir $LOOT_DIR/reports 2> /dev/null
|
||||
mkdir $LOOT_DIR/output 2> /dev/null
|
||||
fi
|
||||
sniper -t $TARGET -m $MODE --noreport $args | tee $LOOT_DIR/output/sniper-$TARGET-$MODE-`date +%Y%m%d%H%M`.txt 2>&1
|
||||
exit
|
||||
fi
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
fi
|
||||
|
||||
# WEBPORTHTTP MODE
|
||||
@@ -506,7 +529,7 @@ if [ "$MODE" = "webporthttp" ]; then
|
||||
echo -e "${OKGREEN}====================================================================================${RESET}"
|
||||
echo -e "$OKRED CHECKING HTTP HEADERS $RESET"
|
||||
echo -e "${OKGREEN}====================================================================================${RESET}"
|
||||
curl --connect-timeout 1 -I -s -R http://$TARGET >> $LOOT_DIR/web/headers-http-$TARGET.txt
|
||||
curl --connect-timeout 1 -I -s -R http://$TARGET >> $LOOT_DIR/web/headers-http-$TARGET.txt
|
||||
echo -e "$OKBLUE+ -- --=[Checking if X-Content options are enabled on $TARGET...$RESET $OKORANGE"
|
||||
curl -s --insecure -I http://$TARGET:$PORT | egrep -i 'X-Content' | tail -n 10
|
||||
echo ""
|
||||
@@ -731,7 +754,7 @@ if [ "$MODE" = "webporthttps" ]; then
|
||||
echo -e "${OKGREEN}====================================================================================${RESET}"
|
||||
echo -e "$OKRED CHECKING HTTP HEADERS $RESET"
|
||||
echo -e "${OKGREEN}====================================================================================${RESET}"
|
||||
curl --connect-timeout 1 -I -s -R https://$TARGET >> $LOOT_DIR/web/headers-https-$TARGET.txt
|
||||
curl --connect-timeout 1 -I -s -R https://$TARGET >> $LOOT_DIR/web/headers-https-$TARGET.txt
|
||||
echo -e "$OKBLUE+ -- --=[Checking if X-Content options are enabled on $TARGET...$RESET $OKORANGE"
|
||||
curl -s --insecure -I https://$TARGET:$PORT | egrep -i 'X-Content' | tail -n 10
|
||||
echo ""
|
||||
@@ -896,9 +919,6 @@ if [ "$MODE" = "stealth" ]; then
|
||||
if [ "$RECON" = "1" ]; then
|
||||
args="$args -re"
|
||||
fi
|
||||
if [ "$LOOT" = "1" ]; then
|
||||
args="$args -l"
|
||||
fi
|
||||
if [ ! -z "$WORKSPACE" ]; then
|
||||
args="$args -w $WORKSPACE"
|
||||
LOOT_DIR=$INSTALL_DIR/loot/workspace/$WORKSPACE
|
||||
@@ -1064,7 +1084,7 @@ if [ "$MODE" = "stealth" ]; then
|
||||
echo -e "${OKGREEN}====================================================================================${RESET}"
|
||||
echo -e "$OKRED CHECKING HTTP HEADERS AND METHODS $RESET"
|
||||
echo -e "${OKGREEN}====================================================================================${RESET}"
|
||||
curl --connect-timeout 1 -I -s -R http://$TARGET >> $LOOT_DIR/web/headers-http-$TARGET.txt
|
||||
curl --connect-timeout 1 -I -s -R http://$TARGET >> $LOOT_DIR/web/headers-http-$TARGET.txt
|
||||
xsstracer $TARGET 80
|
||||
echo -e "${OKGREEN}====================================================================================${RESET}"
|
||||
echo -e "$OKRED SAVING SCREENSHOTS $RESET"
|
||||
@@ -1092,7 +1112,7 @@ if [ "$MODE" = "stealth" ]; then
|
||||
echo -e "${OKGREEN}====================================================================================${RESET}"
|
||||
echo -e "$OKRED CHECKING HTTP HEADERS AND METHODS $RESET"
|
||||
echo -e "${OKGREEN}====================================================================================${RESET}"
|
||||
curl --connect-timeout 1 -I -s -R https://$TARGET >> $LOOT_DIR/web/headers-https-$TARGET.txt
|
||||
curl --connect-timeout 1 -I -s -R https://$TARGET >> $LOOT_DIR/web/headers-https-$TARGET.txt
|
||||
xsstracer $TARGET 443
|
||||
echo -e "${OKGREEN}====================================================================================${RESET}"
|
||||
echo -e "$OKRED GATHERING SSL/TLS INFO $RESET"
|
||||
@@ -1156,9 +1176,6 @@ if [ "$MODE" = "airstrike" ]; then
|
||||
if [ "$RECON" = "1" ]; then
|
||||
args="$args -re -m stealth"
|
||||
fi
|
||||
if [ "$LOOT" = "1" ]; then
|
||||
args="$args -l"
|
||||
fi
|
||||
if [ ! -z "$WORKSPACE" ]; then
|
||||
args="$args -w $WORKSPACE"
|
||||
WORKSPACE_DIR=$INSTALL_DIR/loot/workspace/$WORKSPACE
|
||||
@@ -1261,7 +1278,7 @@ if [ "$MODE" = "nuke" ]; then
|
||||
exit
|
||||
fi
|
||||
if [ "$REPORT" = "1" ]; then
|
||||
args="$args --noreport -m nuke -fp -b -o -r -re -l"
|
||||
args="$args --noreport -m nuke -fp -b -o -re"
|
||||
if [ ! -z "$WORKSPACE" ]; then
|
||||
args="$args -w $WORKSPACE"
|
||||
LOOT_DIR=$INSTALL_DIR/loot/workspace/$WORKSPACE
|
||||
@@ -1275,7 +1292,7 @@ if [ "$MODE" = "nuke" ]; then
|
||||
mkdir $LOOT_DIR/reports 2> /dev/null
|
||||
mkdir $LOOT_DIR/output 2> /dev/null
|
||||
fi
|
||||
sniper -f $(realpath $TARGET) $args | tee $LOOT_DIR/output/sniper-$(basename $TARGET)-$MODE-`date +%Y%m%d%H%M`.txt 2>&1
|
||||
sniper -f $(realpath $FILE) $args | tee $LOOT_DIR/output/sniper-$MODE-`date +%Y%m%d%H%M`.txt 2>&1
|
||||
exit
|
||||
fi
|
||||
for a in `cat $(realpath $FILE)`; do
|
||||
@@ -1323,7 +1340,7 @@ if [ "$REPORT" = "1" ]; then
|
||||
args="$args -b"
|
||||
fi
|
||||
if [ "$FULLNMAPSCAN" = "1" ]; then
|
||||
args="$args -f"
|
||||
args="$args -fp"
|
||||
fi
|
||||
if [ "$RECON" = "1" ]; then
|
||||
args="$args -re"
|
||||
@@ -1337,9 +1354,6 @@ if [ "$REPORT" = "1" ]; then
|
||||
if [ ! -z "$WORKSPACE" ]; then
|
||||
args="$args -w $WORKSPACE"
|
||||
fi
|
||||
if [ "$LOOT" = "1" ]; then
|
||||
args="$args -l"
|
||||
fi
|
||||
args="$args --noreport"
|
||||
sniper $args | tee $LOOT_DIR/output/sniper-$TARGET-`date +%Y%m%d%H%M`.txt 2>&1
|
||||
exit
|
||||
@@ -1456,9 +1470,9 @@ fi
|
||||
echo -e "$OKRED RUNNING UDP PORT SCAN $RESET"
|
||||
echo -e "${OKGREEN}====================================================================================${RESET}"
|
||||
if [ -z "$PORT" ]; then
|
||||
nmap -sU -T5 --open -Pn -p $DEFAULT_UDP_PORTS $TARGET -oX $LOOT_DIR/nmap/nmap-udp-$TARGET.xml
|
||||
nmap -Pn -sU -T4 -p$DEFAULT_UDP_PORTS --open $TARGET -oX $LOOT_DIR/nmap/nmap-udp-$TARGET.xml
|
||||
else
|
||||
nmap -sU -T5 --open -Pn -p $PORT $TARGET -oX $LOOT_DIR/nmap/nmap-udp-$TARGET.xml
|
||||
nmap -Pn -sU -T4 -p$PORT --open $TARGET -oX $LOOT_DIR/nmap/nmap-udp-$TARGET.xml
|
||||
fi
|
||||
|
||||
echo ""
|
||||
@@ -1470,17 +1484,12 @@ port_22=`grep 'portid="22"' $LOOT_DIR/nmap/nmap-$TARGET.xml | grep open`
|
||||
port_23=`grep 'portid="23"' $LOOT_DIR/nmap/nmap-$TARGET.xml | grep open`
|
||||
port_25=`grep 'portid="25"' $LOOT_DIR/nmap/nmap-$TARGET.xml | grep open`
|
||||
port_53=`grep 'portid="53"' $LOOT_DIR/nmap/nmap-$TARGET.xml | grep open`
|
||||
#port_67=`grep 'portid="67"' $LOOT_DIR/nmap/nmap-udp-$TARGET.xml | grep open`
|
||||
#port_68=`grep 'portid="68"' $LOOT_DIR/nmap/nmap-udp-$TARGET.xml | grep open`
|
||||
#port_69=`grep 'portid="69"' $LOOT_DIR/nmap/nmap-udp-$TARGET.xml | grep open`
|
||||
port_79=`grep 'portid="79"' $LOOT_DIR/nmap/nmap-$TARGET.xml | grep open`
|
||||
port_80=`grep 'portid="80"' $LOOT_DIR/nmap/nmap-$TARGET.xml | grep open`
|
||||
port_110=`grep 'portid="110"' $LOOT_DIR/nmap/nmap-$TARGET.xml | grep open`
|
||||
port_111=`grep 'portid="111"' $LOOT_DIR/nmap/nmap-$TARGET.xml | grep open`
|
||||
#port_123=`grep 'portid="123"' $LOOT_DIR/nmap/nmap-udp-$TARGET.xml | grep open`
|
||||
port_135=`grep 'portid="135"' $LOOT_DIR/nmap/nmap-$TARGET.xml | grep open`
|
||||
port_139=`grep 'portid="139"' $LOOT_DIR/nmap/nmap-$TARGET.xml | grep open`
|
||||
#port_161=`grep 'portid="161"' $LOOT_DIR/nmap/nmap-udp-$TARGET.xml | grep open`
|
||||
port_162=`grep 'portid="162"' $LOOT_DIR/nmap/nmap-$TARGET.xml | grep open`
|
||||
port_389=`grep 'portid="162"' $LOOT_DIR/nmap/nmap-$TARGET.xml | grep open`
|
||||
port_443=`grep 'portid="443"' $LOOT_DIR/nmap/nmap-$TARGET.xml | grep open`
|
||||
@@ -1520,6 +1529,14 @@ port_27019=`grep 'portid="27019"' $LOOT_DIR/nmap/nmap-$TARGET.xml | grep open`
|
||||
port_28017=`grep 'portid="28017"' $LOOT_DIR/nmap/nmap-$TARGET.xml | grep open`
|
||||
port_49152=`grep 'portid="49152"' $LOOT_DIR/nmap/nmap-$TARGET.xml | grep open`
|
||||
|
||||
if [ "$FULLNMAPSCAN" = "1" ]; then
|
||||
port_67=`grep 'portid="67"' $LOOT_DIR/nmap/nmap-udp-$TARGET.xml | grep open`
|
||||
port_68=`grep 'portid="68"' $LOOT_DIR/nmap/nmap-udp-$TARGET.xml | grep open`
|
||||
port_69=`grep 'portid="69"' $LOOT_DIR/nmap/nmap-udp-$TARGET.xml | grep open`
|
||||
port_123=`grep 'portid="123"' $LOOT_DIR/nmap/nmap-udp-$TARGET.xml | grep open`
|
||||
port_161=`grep 'portid="161"' $LOOT_DIR/nmap/nmap-udp-$TARGET.xml | grep open`
|
||||
fi
|
||||
|
||||
if [ -z "$port_21" ];
|
||||
then
|
||||
echo -e "$OKRED + -- --=[Port 21 closed... skipping.$RESET"
|
||||
@@ -1626,7 +1643,7 @@ else
|
||||
echo -e "${OKGREEN}====================================================================================${RESET}"
|
||||
echo -e "$OKRED CHECKING HTTP HEADERS $RESET"
|
||||
echo -e "${OKGREEN}====================================================================================${RESET}"
|
||||
curl --connect-timeout 1 -I -s -R http://$TARGET >> $LOOT_DIR/web/headers-http-$TARGET.txt
|
||||
curl --connect-timeout 1 -I -s -R http://$TARGET >> $LOOT_DIR/web/headers-http-$TARGET.txt
|
||||
echo -e "$OKBLUE+ -- --=[Checking if X-Content options are enabled on $TARGET...$RESET $OKORANGE"
|
||||
curl -s --insecure -I http://$TARGET | egrep -i 'X-Content' | tail -n 10
|
||||
echo ""
|
||||
@@ -1826,8 +1843,8 @@ then
|
||||
echo -e "$OKRED + -- --=[Port 161 closed... skipping.$RESET"
|
||||
else
|
||||
echo -e "$OKORANGE + -- --=[Port 161 opened... running tests...$RESET"
|
||||
for a in `cat /usr/share/brutex/wordlists/snmp-strings.txt`; do snmpwalk $TARGET -c $a; done;
|
||||
nmap -sU -p 161 --script=--script=snmp-brute,snmp-hh3c-logins,snmp-info,snmp-interfaces,snmp-ios-config,snmp-netstat,snmp-processes,snmp-sysdescr,snmp-win32-services,snmp-win32-shares,snmp-win32-software,snmp-win32-users $TARGET
|
||||
nmap --script=/usr/share/nmap/scripts/snmp-brute.nse,/usr/share/nmap/scripts/snmp-hh3c-logins.nse,/usr/share/nmap/scripts/snmp-interfaces.nse,/usr/share/nmap/scripts/snmp-ios-config.nse,/usr/share/nmap/scripts/snmp-netstat.nse,/usr/share/nmap/scripts/snmp-processes.nse,/usr/share/nmap/scripts/snmp-sysdescr.nse,/usr/share/nmap/scripts/snmp-win32-services.nse,/usr/share/nmap/scripts/snmp-win32-shares.nse,/usr/share/nmap/scripts/snmp-win32-software.nse,/usr/share/nmap/scripts/snmp-win32-users.nse -sV -A -p 161 -sU -sT $TARGET
|
||||
msfconsole -x "use scanner/snmp/snmp_enum; setg RHOSTS "$TARGET"; run; exit;"
|
||||
fi
|
||||
|
||||
if [ -z "$port_162" ];
|
||||
@@ -1835,8 +1852,8 @@ then
|
||||
echo -e "$OKRED + -- --=[Port 162 closed... skipping.$RESET"
|
||||
else
|
||||
echo -e "$OKORANGE + -- --=[Port 162 opened... running tests...$RESET"
|
||||
for a in `cat /usr/share/brutex/wordlists/snmp-strings.txt`; do snmpwalk $TARGET -c $a; done;
|
||||
nmap -A -p 162 -Pn --script=--script=snmp-brute,snmp-hh3c-logins,snmp-info,snmp-interfaces,snmp-ios-config,snmp-netstat,snmp-processes,snmp-sysdescr,snmp-win32-services,snmp-win32-shares,snmp-win32-software,snmp-win32-users $TARGET
|
||||
nmap --script=/usr/share/nmap/scripts/snmp-brute.nse,/usr/share/nmap/scripts/snmp-hh3c-logins.nse,/usr/share/nmap/scripts/snmp-interfaces.nse,/usr/share/nmap/scripts/snmp-ios-config.nse,/usr/share/nmap/scripts/snmp-netstat.nse,/usr/share/nmap/scripts/snmp-processes.nse,/usr/share/nmap/scripts/snmp-sysdescr.nse,/usr/share/nmap/scripts/snmp-win32-services.nse,/usr/share/nmap/scripts/snmp-win32-shares.nse,/usr/share/nmap/scripts/snmp-win32-software.nse,/usr/share/nmap/scripts/snmp-win32-users.nse -sV -A -p 162 -sU -sT $TARGET
|
||||
msfconsole -x "use scanner/snmp/snmp_enum; setg RHOSTS "$TARGET"; run; exit;"
|
||||
fi
|
||||
|
||||
if [ -z "$port_389" ];
|
||||
@@ -1868,7 +1885,7 @@ else
|
||||
echo -e "${OKGREEN}====================================================================================${RESET}"
|
||||
echo -e "$OKRED CHECKING HTTP HEADERS $RESET"
|
||||
echo -e "${OKGREEN}====================================================================================${RESET}"
|
||||
curl --connect-timeout 1 -I -s -R https://$TARGET >> $LOOT_DIR/web/headers-https-$TARGET.txt
|
||||
curl --connect-timeout 1 -I -s -R https://$TARGET >> $LOOT_DIR/web/headers-https-$TARGET.txt
|
||||
echo -e "$OKBLUE+ -- --=[Checking if X-Content options are enabled on $TARGET...$RESET $OKORANGE"
|
||||
curl -s --insecure -I https://$TARGET | egrep -i 'X-Content' | tail -n 10
|
||||
echo ""
|
||||
@@ -2498,4 +2515,5 @@ if [ "$LOOT" = "1" ] && [ -z "$NOLOOT" ]; then
|
||||
loot
|
||||
fi
|
||||
|
||||
exit 0
|
||||
exit 0
|
||||
|
||||
|
||||
0
uninstall.sh
Normal file → Executable file
0
uninstall.sh
Normal file → Executable file
Reference in New Issue
Block a user