release/0.2.20 #68
grisuno
announced in
Announcements
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
What's Changed
Full Changelog: release/0.2.19...release/0.2.20
getnthash_py
Executes the getnthash.py tool from PKINITtools to retrieve the NT hash using a Kerberos U2U TGS request.
This function performs the following actions:
Parameters:
line (str): Command arguments specifying the AS-REP key and target identity.
Expected format:
- identity
- Additional flags like -key KEY, -dc-ip ip address, etc.
Returns:
None
gets4uticket_py
Executes the gets4uticket.py tool from PKINITtools to request an S4U2Self service ticket using Kerberos.
This function performs the following actions:
Parameters:
line (str): Command arguments specifying the kerberos_connection_url, SPN, target user, and ccache.
Expected format:
- kerberos_connection_url spn targetuser ccache
- Additional flags like -v for verbose output.
Returns:
None
aclpwn_py
Executes the aclpwn.py tool to find and exploit ACL paths for privilege escalation in an Active Directory environment.
This function performs the following actions:
Parameters:
line (str): Command arguments specifying the find and target points, domain, and optional flags.
Expected format:
- -f starting_point -ft starting_type -d domain
- Additional flags like -t target, -tt target_type, --server, -dry, --restore, etc.
Returns:
None
addspn_py
Executes the addspn.py tool to manage Service Principal Names (SPNs) on Active Directory accounts via LDAP.
This function performs the following actions:
Parameters:
line (str): Command arguments specifying the target hostname, user credentials, and SPN actions.
Expected format:
- hostname user password target spn -options
- Options include:
- -r to remove an SPN
- -q to query current SPNs
- -a to add SPN via msDS-AdditionalDnsHostName
Returns:
None
dnstool_py
Executes the dnstool.py tool to modify Active Directory-integrated DNS records.
This function performs the following actions:
Parameters:
line (str): Command arguments specifying the DNS action, target record, and data.
Expected format:
- hostname user password record action -options
- Options include:
- -a to add a record
- -r to remove a record
- --forest to target ForestDnsZones
Returns:
None
printerbug_py
Executes the printerbug.py tool to trigger the SpoolService bug via RPC backconnect.
This function performs the following actions:
Parameters:
line (str): Command arguments specifying the target and attacker host.
Expected format:
- target_username@target_host attacker_host
Returns:
None
krbrelayx_py
Executes the krbrelayx.py tool for Kerberos relaying or unconstrained delegation abuse.
This function performs the following actions:
Parameters:
line (str): Command arguments specifying the target and options.
Expected format:
- target options
- Options include:
- -t target_host to specify the target host
- -l loot directory to save TGTs or dump information
Returns:
None
autoblody
Executes the autobloody tool for automating Active Directory privilege escalation paths.
This function performs the following actions:
Parameters:
line (str): Command arguments specifying the source and target objects and options.
Expected format:
- -u username for NTLM authentication
- -p password for NTLM authentication
- --host domain_controller_ip for the IP of the Domain Controller
- -dp neo4j_password for Neo4j database password
- -ds source_label for the source node label in BloodHound
- -dt target_label for the target node label in BloodHound
Returns:
None
upload_gofile
Uploads a file to Gofile storage.
This function performs the following actions:
Parameters:
line (str): Command arguments specifying the file path and options.
Expected format:
- <file_path>
- Options include:
- --folderId <folder_id> to specify the folder where the file should be uploaded
Returns:
None
unicode_WAFbypass
}()"}
Some WAF can be bypassed with the use of unicode characters.
sqli_mssql_test
Initiates a reverse MSSQL shell by starting an HTTP server to handle incoming connections and exfiltrate data.
This function does the following:
Parameters:
line (str): Unused command argument from the cmd2 prompt.
Returns:
None
targetedKerberoas
Executes the targetedKerberoast tool for extracting Kerberos service tickets.
This function performs the following actions:
Parameters:
line (str): Command arguments specifying the user, domain, and options.
Expected format:
- domain user hash or password [optional parameters]
Returns:
None
pyoracle2
Executes the pyOracle2 tool for performing padding oracle attacks.
This function performs the following actions:
Parameters:
line (str): Command arguments specifying additional tool options if required.
Expected format: [optional parameters]
Returns:
None
paranoid_meterpreter
Creates and deploys a paranoid Meterpreter payload and listener with SSL/TLS pinning and UUID tracking.
This function performs the following actions:
Parameters:
line (str): Command arguments specifying target configurations.
Expected format:
- rhost lhost domain subdomain
Returns:
None
lfi
Exploits a potential Local File Inclusion (LFI) vulnerability by crafting
and sending HTTP GET requests to a specified URL.
The user can specify the target URL directly via the
line
parameter orprovide it interactively. If no URL is provided, the method uses a default
value stored in
self.params["url"]
. Users are then prompted to specifythe file to retrieve from the server, defaulting to
/etc/passwd
.Args:
line (str): Optional URL input provided directly in the command line.
If not supplied, a default URL from
self.params["url"]
will be used.
Behavior:
- Continuously prompts the user to specify a file to fetch via the
target LFI vulnerability.
- Sends a GET request to the constructed URL and prints the server's
response to the console.
- Allows users to inspect different files on the target server by
modifying the file path interactively.
greatSCT
Executes the GreatSCT tool for generating payloads that bypass antivirus and application whitelisting solutions.
This function performs the following actions:
Parameters:
line (str): Command arguments specifying additional tool options if required.
Expected format: [--ip --port --tool --payload ]
Returns:
None
sqsh
Executes the Impacket sqsh tool for manipulating ownership of Active Directory objects.
This function performs the following actions:
The command accepts the following parameters:
Parameters:
line (str): Command argument specifying the new owner and target options.
Expected format:
- -new-owner NEW_OWNER for the new owner
- -target TARGET_OBJECT for the target object
- Required flags for authentication and connection
Returns:
None
setoolKits
Executes the SEToolKit workflow to generate a Meterpreter payload
and configure the multi-handler using LHOST and LPORT from self.params.
Usage:
do_setoolKits
Arguments:
None: LHOST and LPORT are retrieved from self.params.
Workflow:
1. Launches SEToolKit.
2. Navigates to option 1 (Social-Engineering Attacks).
3. Selects option 9 (Powershell Alphanumeric Shellcode Injector).
4. Configures LHOST and LPORT using values from self.params.
5. Generates a Meterpreter reverse HTTPS payload.
6. Configures a multi-handler to listen for incoming connections.
jwt_tool
Uses the jwt_tool to analyze, tamper, or exploit JSON Web Tokens (JWTs).
This function performs the following actions:
Parameters:
line (str): Command argument containing a JWT token to analyze. If not provided, prompts the user for a token.
Returns:
None
darkarmour
Uses the darkarmour tool to generate an undetectable version of a PE executable.
This function performs the following actions:
Parameters:
line (str): Command line arguments for the tool.
Returns:
None
osmedeus
Executes Osmedeus scans with guided input for various scanning scenarios.
This function performs the following actions:
and installs the required dependencies.
parameters needed for the scan.
Parameters:
line (str): Command-line arguments for the tool. If not provided, interactive
input will be used.
Returns:
None
metabigor
Executes Metabigor commands for OSINT and scanning tasks with guided input or predefined arguments.
This function performs the following actions:
Parameters:
line (str): Command-line arguments for Metabigor. If not provided, interactive input will be used.
Returns:
None
ip2asn
Command to get ASN for a given IP address.
atomic_tests
Executes Atomic Red Team tests based on user-selected platform and test.
This function performs the following actions:
Parameters:
line (str): Command-line arguments for specifying a test ID or additional parameters.
If not provided, interactive input will be used.
Returns:
None
mitre_test
Interacts with the MITRE ATT&CK framework using the STIX 2.0 format.
This function connects to a locally cached or downloaded ATT&CK dataset in STIX 2.0 format.
It allows the user to explore tactics, techniques, and procedures (TTPs) and filter them
based on specific criteria, such as platform or tactic.
Parameters:
line (str): User input, which may specify filters or actions, such as a tactic name or technique ID.
Usage:
mitre_test list # Lists all tactics and techniques
mitre_test tactic # Lists techniques for a specific tactic
mitre_test technique # Shows details of a specific technique
bbot
Executes a BBOT scan to perform various reconnaissance tasks.
This function leverages BBOT, a reconnaissance tool, to perform tasks such as subdomain enumeration,
email gathering, web scanning, and more. It dynamically determines the operation based on user input
and executes the appropriate BBOT commands.
Parameters:
line (str): User input specifying the target and optional presets or configurations.
Usage:
bbot -t -p
amass
Executes Amass to perform a passive enumeration on a given domain.
This function performs the following steps:
Parameters:
line (str): The domain to be enumerated, e.g., 'example.com'.
Returns:
None
filtering
Applies various filtering techniques to the given command line by modifying each character or word appropriately.
This function takes any command and generates variations of it using several filtering techniques, including:
Parameters:
line (str): The input command to be filtered.
Returns:
None
lol
Exploits a target by injecting a malicious payload and collecting admin information.
This function performs the following steps:
Parameters:
line (str): Additional parameters for the target.
Returns:
None
This discussion was created from the release release/0.2.20.
Beta Was this translation helpful? Give feedback.
All reactions