Skip to content

CTF enumeration tool. It facilitates the Network Pentest

Notifications You must be signed in to change notification settings

josemlwdf/CTFEnum

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 

Repository files navigation

CTFEnum - Network Penetration Test Tool

Overview

CTFEnum is a Python-based tool designed to assist in network penetration tests, particularly for Capture The Flag (CTF) challenges. It performs reconnaissance by scanning and analyzing open ports on a provided IP address. The tool uses various modules to probe different services associated with these open ports. Employing multiprocessing, it concurrently executes different modules to identify potential vulnerabilities across multiple ports.

Features

Scans open TCP and UDP ports using Nmap. Utilizes modular design with specific handlers for different services (e.g., FTP, Telnet, SMTP, HTTP, DNS, Kerberos, etc.). Provides recommendations and potential actions for specific ports (e.g., brute force attempts, service-specific commands).

Requirements

Python 3.x
Nmap
Gobuster
Dig
Crackmapexec
Metasploit
etc...
Required Python libraries: subprocess, multiprocessing, sys, re, etc...

Installation

curl https://raw.githubusercontent.com/josemlwdf/CTFEnum/main/install.sh|bash

Usage

Run the tool by providing the IP address as an argument:

python3 /application/path/CTFEnum.py <IP_ADDRESS>

If installed with install.sh:

ctfenum <IP_ADDRESS>

Replace <IP_ADDRESS> with the target IP address you intend to scan.

image

The program will perform a comprehensive port scan using Nmap to identify open TCP and UDP ports on the specified IP address.

CTFEnum will then initiate module-specific handlers based on identified open ports to analyze and potentially exploit services running on these ports.

Detailed Features (Modules)

NMAP Scan

  • Automatic nmap ports detection + Nmap port details Scan. image

  • Scraps for DNS from Nmpa Scan.

FTP

  • Check for anonymous login.
  • Bruteforce using common users and passwords.
  • List directories. image

SSH

  • Suggests SSH credentials bruteforce. image

TELNET

  • Retrieve Nmap information using this service specific scripts.

SMTP

  • Retrieve Nmap information using this service specific scripts.

FINGER

  • Enumerate users using this service.

HTTP

  • Identify server and possible common technologies.

  • Crawl and bruteforce locations using feroxbuster. image

  • Detects VHOSTS and add them automatically to /etc/hosts file.

  • Extract comments from the founded URLs. image

  • Test automatically for Apache Server CVEs if the version matches.

KERBEROS

  • Kerberos usenames enumeration. image

  • Kerberoast Automatic ticket Extraction.

  • Kerberos Atuomatic Synchronization with DC.

  • Suggest Ticket Cracking. image

POP

  • Suggests POP credentials bruteforce.

RPC BIND

  • Suggest Hacktrics page as reference.

IMAP

  • Enumerates IMAP version.
  • Suggests Hacktrics page as reference.

SMB

  • RID Cycling usernames enumeration Attack as Guest. image

  • RID Cycling usernames enumeration Attack with founded credentials.

  • Bruteforce using common users and passwords.

  • Bruteforce using founded users. image

  • Bruteforce using options NULL pass, User as Pass and common passwords.

  • Shares enumeration using NULL creds, Guest and founded credentials. image

TFTP

  • Check if TFTP server allow PUT files.

SNMP

  • Automatic Nmap SNMP targeted scan.
  • Community password bruteforce.
  • Automatic strings extraction.

DNS

  • Perform dig scan on DNS.
  • Automatic DNS registration on /etc/hosts file.

IRC

  • Suggest Hacktrics page as reference.

CHECKPOINT FIREWALL

  • Enumerates the hostname

Notes

The tool suggests actions for certain ports, such as potential brute force attempts or specific commands to execute. For optimal usage, ensure proper permissions and avoid using this tool on networks you don't have authorization to test.

Disclaimer

This tool is intended for educational and ethical penetration testing purposes only. Ensure that you have proper authorization before using it on any network or system you do not own or have explicit permission to test.

About

CTF enumeration tool. It facilitates the Network Pentest

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published