Skip to content

brianwitte/pentest

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

PENTEST & TOOLS

Tools and more...

FINGERPRINT

  • lowhanging.sh - A custom script used during the first steps of the OSCP network discovery.

  • pillage.sh
    Finding interesting files on a system thanks to a LFI previously found on the target.
    list of interesting files on Linux
    list of interesting files on Windows
    N.B: need to be migrated in python with multithreading

  • haveibeenpwned.sh - Takes input emails and checking their pwned status on https://haveibeenpwned.com/.

  • versionchecker.sh
    versionchecker.sh will hash some input files and compare them to hashes computed from the specific GIT releases. It helps to identify for example a CMS version if some CHANGELOG.txt files are missing.
    Example of command: ./versionchecker.sh -s ./input -g ~/Documents/repo/drupal/ -p "^[78].[0-9.]+$"

PRIVILEGE ESCALATION

  • LinEnum.sh (forked: https://github.com/phackt/LinEnum/blob/master/LinEnum.sh)
    Famous privesc script for Linux enchanced according to my needs:

    • check for SELinux
    • check for adm group's users
    • display raw /etc/fstab
    • add some recommendations
  • linux/lin_shell_bind_tcp.c - /bin/sh TCP bind shell.

  • linux/lin_reverse_tcp_shell.c - /bin/sh TCP reverse shell.

  • linux/uid_gid_root_shell.c - setreuid/setregid root /bin/sh shell.

  • windows/privesc.bat - Custom privesc script for windows using accesschk.exe (needed to be uploaded in the same time, check sysinternals).

  • windows/wmic_info.bat - Relevant information thanks to the WMI command-line utility.

  • windows/win_user_add.c - Add Windows user to local group Administrators.

EXPLOITS

  • shellshock_webshell.py - Exploits a vuln cgi script (shellshock - GNU Bash through 4.3).
  • egg_hunter.c - A 18 bytes Egg-Hunter shellcode (https://www.exploit-db.com/exploits/41909/)
  • rce_phpmailer_exim.py - Reverse shell linux exploit for PHPMailer < 5.2.20, SwiftMailer <= 5.4.5-DEV, zend-mail < 2.4.11 with Exim MTA
  • keylogger.js - Keylogger in javascript useful when XSS found or browser cache poisoning while MITM
  • formscapture.js - Set a callback function on all forms submit event

NETWORK

  • killswitch.sh - Forces traffic through VPN - no leakage if VPN shuts down.

  • mitm/phishing.sh - Launches an MITM attack and redirecting a specific domain to our phising web page.

  • mitm.sh (with Mitmproxy) - has it's own repo
    A custom proxy that aims at stripping all HTTPS web page links and keeping unsecure connection with the proxy: VICTIM <-- HTTP --> MITMPROXY <-- HTTPS --> WEBSITE.
    It works for any websites with at least one insecure page (which reliably means HSTS is not used for the current domain).
    You can control and do whatever you want with the trafic thanks to custom Python scripts.

WORDLISTS

  • dorks-lfi-rfi.txt (dorks for LFI/RFI)

DEV

  • bruteforce/java/
  • bruteforce/javascript/ - Bruteforce algorithms with permutations and fixed position characters.

VULNHUB MACHINES PWNED

FAVORITE LINKS

http://www.fuzzysecurity.com/tutorials/16.html
https://github.com/pentestmonkey/windows-privesc-check
http://httpsecure.org/?works=windows-privilege-escalation-exploit
http://pwnwiki.io/#!presence/windows/blind.md
http://httpsecure.org/?works=windows-privilege-escalation-exploit
https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Draft/Privilege%20Escalation%20%26%20Post-Exploitation.md
https://jivoi.github.io/2015/07/01/pentest-tips-and-tricks/
https://dirtycow.ninja/
https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/
https://github.com/PenturaLabs/Linux_Exploit_Suggester
https://www.kernel-exploits.com/
https://www.youtube.com/watch?v=kMG8IsCohHA
https://www.exploit-db.com/
http://www.securityfocus.com/
https://exploits.shodan.io/welcome
https://packetstormsecurity.com/files/tags/exploit/
http://shell-storm.org/
http://www.xss-payloads.com/

About

Custom tools and projects about security

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Shell 57.2%
  • Python 13.2%
  • Batchfile 12.2%
  • C 7.2%
  • JavaScript 5.5%
  • Java 4.7%