ubuntu into a auditing machine
Post on 02-Jun-2018
221 Views
Preview:
TRANSCRIPT
-
8/10/2019 Ubuntu Into a Auditing Machine
1/30
#!/bin/sh# securitybox.sh - Turn a generic Ubuntu or Debian SO into a security auditing machine with one command# Version 1.01# ekx0day at GMAIL.COM# Yu may have r00t privileges in order to install
if [ `id | cut -d= -f3 | cut -d\( -f1` = 0 ]then echo echo " Okay, you are r00t and can run this script" echosleep 1
# dnswalk#Checks dns zone information using nameserver lookups#dnswalk is a DNS debugger. It performs zone transfers of specified#domains, and checks the database in numerous ways for internal#consistency, as well as accuracy.apt-get -y install dnswalk
# dns-bruteforce
# dnsenum# dnsmap# DNSPredict# Finger Google
#finger-ldap#Finger for machines that authenticate against LDAP#finger-ldap displays information about system users, by calling the BSD#finger command. However, it works around a gross inefficiency of#BSD finger's full-name matching algorithm by exploiting the LDAP#Search Filter mechanism, outlined in RFC 2254.#apt-get -y install finger-ldap
# Commented out because the install asked too many questions
# Firewalk# Goog Mail Enum# Google-search# Googrape# Gooscan
# Host#utility for querying DNS servers#'host' is a utility, similar to 'nslookup' (deprecated) or 'dig',#used to query DNS servers for domain names and zones.
##This package provides the original version of 'host', originally#in the package 'dnsutils'. BIND9 provides a similar utility, in#'bind9-host'.# apt-get -y install bind9-hostapt-get -y install host
#Internetwork Routing Protocol Attack Suite#Despite the "exciting" title this is merely a collection of programs
-
8/10/2019 Ubuntu Into a Auditing Machine
2/30
#used for advanced network operations, testing, and debugging.##CDP and the route injectors can be useful in a production network.#Several other tools are useful for security and firewall testing.#Finally some tools such as netenum are useful for general admin#scripting.##Like all powerful tools, someone whom is terminally stupid could#cause great damage when using these tools, so be careful.##cdp - Cisco discovery protocol packet sender#igrp - IGRP route injector#ass - Autonomous system scanner#irdp - IRDP sender#irdpresponder - IRDP responder#itrace - ICMP based traceroute#tctrace - TCP SYN based traceroute#protos - ICMP based port scanner#netmask - Asks for netmask via ICMP#file2cable - Dumps any binary file direct to ethernet#dfkaa - Troubleshoot devices formerly known as Ascend (Pipeline, etc)#netenum - Ping scanner designed for shell scripts#hsrp - HSRP failover tester#icmp_redirect - ICMP redirection system
#timestamp - ICMP timestamp requester#dhcpx - DHCP server "exerciser"##I placed this program in "non-free" because per the license:#1) A developer is required to get written permission to use code# from IRPAS in derivative works#2) Users are barred from using this software for illegal purposesapt-get -y install irpas
# Pirana# QGoogle# Relay Scanner
# SMTP-Vrfy
# - Network Mapping# Amap 5.2# Autoscan 0.99_R1
# cdpr#Cisco Discovery Protocol Reporter#cdpr listens on specified network interfaces for Cisco Discovery#Protocol packets. It then decodes those packets and outputs the#information, optionally sending the information to a server for
#processing.apt-get -y install cdpr
# Cheops NG#Network swiss army knife#Cheops-ng is a Network management tool for mapping and monitoring#your network. It has host/network discovery functionality as well as#OS detection of hosts making. Cheops-ng has the ability to probe hosts to see#what services they are running. On some services, cheops-ng is actually
-
8/10/2019 Ubuntu Into a Auditing Machine
3/30
#able to see what program is running for a service and the version#number of that program.##Cheops-ng is a replacement for Cheops ('ng' stands for 'Next Generation').#Main differences with cheops are:# * Cheops is a GUI program whereas cheops-ng has a backend server# that is running all of the time. The GUI for cheops-ng just logs into# the server to use the server's functions, like OS detection and mapping.# * OS detection is done with nmap not with queso (which is out of date)# * Cheops-ng does not have monitoring capabilities yet.# * It is being maintained and supported##Homepage: http://cheops-ng.sourceforge.netapt-get -y install cheops-ng
# doscan#port scanner for discovering services on large networks#doscan is a tool to discover TCP services on your network. It is#designed for scanning a single ports on a large network. doscan#contacts many hosts in parallel, using standard TCP sockets provided#by the operating system. It is possible to send strings to remote#hosts, and collect the banners they return.#
#There are better tools for scanning many ports on a small set of#hosts, for example nmap.apt-get -y install doscan
# Fping#sends ICMP ECHO_REQUEST packets to network hosts#fping is a ping like program which uses the Internet Control Message Protocol#(ICMP) echo request to determine if a target host is responding. fping#differs from ping in that you can specify any number of targets on the command#line, or specify a file containing the lists of targets to ping. Instead of#sending to one target until it times out or replies, fping will send out a#ping packet and move on to the next target in a round-robin fashion.
## Homepage: http://www.fping.com/apt-get -y install fping
# Hping#Active Network Smashing Tool#hping3 is a network tool able to send custom ICMP/UDP/TCP packets and#to display target replies like ping does with ICMP replies. It handles#fragmentation and arbitrary packet body and size, and can be used to#transfer files under supported protocols. Using hping3, you can test#firewall rules, perform (spoofed) port scanning, test network#performance using different protocols, do path MTU discovery, perform#traceroute-like actions under different protocols, fingerprint remote
#operating systems, audit TCP/IP stacks, etc. hping3 is scriptable#using the TCL language.#apt-get -y install hping2apt-get -y install hping3
# IDSWakeup#tool for testing network intrusion detection systems#idswakeup is a Bourne shell script invoking hping2 (required) and iwu#(part of this package) to generate false alarms in order to check if#a network intrusion detection system works all right.
-
8/10/2019 Ubuntu Into a Auditing Machine
4/30
##idswakeup requires no configuration and includes many common attack#simulations.apt-get -y install idswakeup
# Python-Scapy#Packet generator/sniffer and network scanner/discovery#Scapy is a powerful interactive packet manipulation tool, packet#generator, network scanner, network discovery, packet sniffer, etc. It#can for the moment replace hping, 85% of nmap, arpspoof, arp-sk, arping,#tcpdump, tethereal, p0f, ....##In scapy you define a set of packets, then it sends them, receives#answers, matches requests with answers and returns a list of packet couples#(request, answer) and a list of unmatched packets. This has the big advantage#over tools like nmap or hping that an answer is not reduced to#(open/closed/filtered), but is the whole packet.## Homepage: http://www.secdev.org/projects/scapy/apt-get -y install python-scapy
# IKE-Scan#discover and fingerprint IKE hosts (IPsec VPN Servers)
#ike-scan discovers IKE hosts and can also fingerprint them using the#retransmission backoff pattern.##ike-scan does two things:##a) Discovery: Determine which hosts are running IKE.# This is done by displaying those hosts which respond to the IKE requests# sent by ike-scan.# .#b) Fingerprinting: Determine which IKE implementation the hosts are using.# This is done by recording the times of the IKE response packets from the# target hosts and comparing the observed retransmission backoff pattern# against known patterns.
# .# The retransmission backoff fingerprinting concept is discussed in more# detail in the UDP backoff fingerprinting paper which should be included# in the ike-scan kit as udp-backoff-fingerprinting-paper.txt.apt-get -y install ike-scan
# IKEProbe
# lft#layer-four traceroute#lft sends various TCP SYN and FIN probes (differing from Van Jacobson's#UDP-based method) utilizing the IP protocol "time to live" field and
#attempts to elicit an ICMP TIME_EXCEEDED response from each gateway along#the path to some host.#lft also listens for various TCP and ICMP messages along the way to assist#network managers in ascertaining per-protocol heuristic routing information#and can optionally retrieve various information about the networks it#traverses.##Homepage: http://www.mainnerve.com/lft/index.htmlapt-get -y install lft
-
8/10/2019 Ubuntu Into a Auditing Machine
5/30
-
8/10/2019 Ubuntu Into a Auditing Machine
6/30
#user-end computer it could be used as powerful IDS add-on. p0f#supports full tcpdump-style filtering expressions, and has an#extensible and detailed fingerprinting database.apt-get -y install p0f
# pnscan#Multi threaded port scanner#Pnscan is a multi threaded port scanner that can scan a large network#very quickly. If does not have all the features that nmap have but#is much faster.apt-get -y install pnscan
# PSK-Crack
# Paketto#Unusual TCP/IP testing tools#The Paketto Keiretsu is a collection of tools that use new and unusual#strategies for manipulating TCP/IP networks. scanrand is said to be#faster than nmap and more useful in some scenarios.##This package includes:# * scanrand, a very fast port, host, and network trace scanner# * minewt, a user space NAT/MAT (MAC Address Translation) gateway
# * linkcat(lc), that provides direct access to the network (Level 2)# * paratrace, a "traceroute"-like tool using existing TCP connections# * phentropy, that plots a large data source onto a 3D matrixapt-get -y install paketto
# SinFP# UnicornScan# UnicornScan pgsql 0.4.6e module version 1.03
# XProbe2#Remote OS identification
#Xprobe2 allows you to determine what operating system is running on a#remote host. It sends several packets to a host and analyses the#returned answers.##Xprobe2's functionality is comparable to the OS fingerprinting feature#in nmap (written by a different Fyodor):# - Outputs its level of confidence about the OS on the remote host.# - Remains usable even if intermediate systems (routers, firewalls) make# slight modifications to the packets.# - Can list the type of intermediate device (e.g. "Linux IP masquerading").# - Modular architecture allows new fingerprinting tests and new OS# signatures to be added.#
#Project homepage: apt-get -y install xprobe
# PBNJ#a suite of tools to monitor changes on a network#PBNJ is a network suite to monitor changes that occur on a network#over time. It does this by checking for changes on the target#machine(s), which includes the details about the services running on
-
8/10/2019 Ubuntu Into a Auditing Machine
7/30
#them as well as the service state. PBNJ parses the data from a scan#and stores it in a database. PBNJ uses Nmap to perform scans.apt-get -y install pbnj
# zenmap#The Network Mapper Front End#Zenmap is an Nmap frontend. It is meant to be useful for advanced users#and to make Nmap easy to use by beginners. It was originally derived#from Umit, an Nmap GUI created as part of the Google Summer of Code.apt-get -y install zenmap
# - Vulnerability Identification# Absinthe# Bed# CIRT Fuzzer# Checkpwd# Cisco Auditing Tool# Cisco Enable Bruteforcer# Cisco Global Exploiter# Cisco OCS Mass Scanner# Cisco Scanner# Cisco Torch
# Curl#Get a file from an HTTP, HTTPS or FTP server#curl is a client to get files from servers using any of the supported#protocols. The command is designed to work without user interaction#or any kind of interactivity.##curl offers a busload of useful tricks like proxy support, user#authentication, ftp upload, HTTP post, file transfer resume and more.apt-get -y install curl
# eLinks
#Advanced text-mode WWW browser#ELinks (Enhanced Links) is a lynx-like character mode browser, created#from the Links browser with many patches and enhancements. It includes#support for rendering tables and frames, features background downloads,#can display colors, supports the Lua scripting language, IPV6 and has#many other features.apt-get -y install elinks
# fragroute#Test a NIDS by attempting to evade using fragmented packets#fragroute intercepts, modifies, and rewrites egress traffic destined
#for a specified host, implementing most of the attacks described in the#Secure Networks "Insertion, Evasion, and Denial of Service: Eluding#Network Intrusion Detection" paper of January 1998.##It features a simple ruleset language to delay, duplicate, drop,#fragment, overlap, print, reorder, segment, source-route, or otherwise#monkey with all outbound packets destined for a target host, with#minimal support for randomized or probabilistic behaviour.##This tool was written in good faith to aid in the testing of network
-
8/10/2019 Ubuntu Into a Auditing Machine
8/30
#intrusion detection systems, firewalls, and basic TCP/IP stack#behaviour. Please do not abuse this software.apt-get -y install fragroute
# fragrouter#Test a NIDS by attempting to evade using fragmented packets#Fragrouter is aimed at testing the correctness of a NIDS, according#to the specific TCP/IP attacks listed in the Secure Networks NIDS#evasion paper. ``Insertion, Evasion, and Denial of Service: Eluding#Network Intrusion Detection.'' It does this by routing network#traffic in such a way as to elude most network intrusion detection#systems.apt-get -y install fragrouter
# fuzz#stress-test programs by giving them random input#The fuzz generator is designed to attack certain kinds of software and#expose one particular kind of bug common in software. This is the#situation where the programmer implicitly makes some assumptions about#the data stream that the program will be parsing. If the data stream#is substantially different then the program might not be able to deal#with it.
apt-get -y install fuzz
# Fuzzer 1.2# GFI LanGuard 2.0# GetSids# HTTP PUT# Halberd
# harden-remoteaudit#Audit your remote systems from this host#This package helps you to install a set of tools to check remote systems,#sniff for passwords and more. Observe that this kind of activity can be
#illegal so you have to check if you are authorized to do so in the environment#where you install this package.##You can check exploits, sniff for passwords and similar things.##Nessus note: You have to have the nessus client installed on some host. The#client is provided by the 'nessus' package. You can install it on the same#host but that is not necessary.##NOTE! This package includes packages that can damage the system that#you audit. It should ONLY be used to audit hosts, networks or systems#that you are allowed to audit. I repeat: it can damage the hosts that are#checked. You have been warned!
apt-get -y install harden-remoteaudit
# Httprint# Httprint GUI# ISR-Form# Jbrofuzz# List-Urls# Merge Router Config
-
8/10/2019 Ubuntu Into a Auditing Machine
9/30
-
8/10/2019 Ubuntu Into a Auditing Machine
10/30
#and smbspool. If you want to mount shares exported from Microsoft#Windows machines or a Samba server you must install the smbfs package.apt-get -y install smb-client
# SMB Serverscan
# SMB-NAT#Netbios Auditing Tool#This tool can perform various security checks on remote#servers running NetBIOS file sharing services. It#is capable of enumerating shares and make break-in attempts#using a (user-provided) list of users and passwords.apt-get -y install smb-nat
# SMBdumpusers# SMBgetserverinfo
# SNMP Scanner# SNMP Walk
# scli#a collection of SNMP command line management tools#The scli package was written in order to have small and efficient command#line utility to monitor and configure network devices and host systems. The#scli package is based on the SNMP management protocol and it utilizes a#MIB compiler called smidump to generate C stub code. In fact, virtually no#SNMP knowledge is required in order to extend the scli programs with new#features.##In other words, the slogan for this little package is:## "After more than 10 years of SNMP, I felt it is time for really useful
# command line SNMP monitoring and configuration tools. ;-)"##(description taken from upstream sources)##scli replaces the stools packageapt-get -y install scli
# Spike Proxy#Web application security testing proxy#SPIKE proXy is part of the SPIKE Application Testing Suite,#It functions as an HTTP and HTTPS proxy, and allows the web developer#or web application auditor low level access to the entire web application
#interface, while also providing a bevy of automated tools and techniques#for discovering common problems. These automated tools include:## - Automated SQL Injection Detection# - Web Site Crawling (guaranteed not to crawl sites other than# the one being tested)# - Login form brute forcing# - Automated overflow detection# - Automated directory traversal detection#
-
8/10/2019 Ubuntu Into a Auditing Machine
11/30
#In addition to automated analysis, SPIKE proXy allows the user to#analyse the internals of the web application by viewing and changing#all variables, cookies, headers, or other parts of the request and#resubmit them. Also, a single installation can be shared by multiple users.apt-get -y install spikeproxy
# SQL Inject# SQL Scanner# SQLLibf# SQLbrute# Sidguess
# xsmbrowser#X11 tool for navigating SMB Networks#xSMBrowser is a tool for navigating SMB Networks (Samba, SMB, CIFS).#It retains the features of the program it was based upon (Microsoft's#Network Neighborhood), but adds convenient features for Unix users.#These include mounting, ability to change networks on-the-fly, and#conveniences such as a Stop Button.apt-get -y install xsmbrowser
# Snmpcheck# Snmp Enum
# Spike# Stompy# SuperScan# TNScmd# Taof# VNC_bypauth
# Wapiti#Web application vulnerability scanner#Wapiti allows you to audit the security of your web applications.#It performs "black-box" scans, i.e. it does not study the source code of the#application but will scans the webpages of the deployed webapp, looking for
#scripts and forms where it can inject data.#Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to see#if a script is vulnerable.#Wapiti can detect the following vulnerabilities:# - File Handling Errors (Local and remote include/require, fopen, ...)# - Database Injection (PHP/JSP/ASP SQL Injections and XPath Injections)# - XSS (Cross Site Scripting) Injection# - LDAP Injection# - Command Execution detection (eval(), system(), passtru()...)# - CRLF Injection (HTTP Response Splitting, session fixation...)## Homepage: http://wapiti.sourceforge.net/#apt-get -y install wapiti
# Yersinia#Network vulnerabilities check software#Yersinia is a framework for performing layer 2 attacks. It is designed#to take advantage of some weakeness in different network protocols. It#pretends to be a solid framework for analyzing and testing the deployed#networks and systems.##Attacks for the following network protocols are implemented in this
-
8/10/2019 Ubuntu Into a Auditing Machine
12/30
#particular release:# - Spanning Tree Protocol (STP).# - Cisco Discovery Protocol (CDP).# - Dynamic Trunking Protocol (DTP).# - Dynamic Host Configuration Protocol (DHCP).# - Hot Standby Router Protocol (HSRP).# - 802.1q.# - 802.1x.# - Inter-Switch Link Protocol (ISL).# - VLAN Trunking Protocol (VTP).## Homepage: http://www.yersinia.net/#apt-get -y install yersina
# zzuf#transparent application input fuzzer#Zzuf is a transparent fuzzer. It works by intercepting applications' file#and network operations and changing random bits in their input. Its behaviour#is deterministic, making it easy to reproduce bugs.##Zzuf has support for variable fuzzing ratio, character filtering, fuzzing#decision based on filenames and optional network fuzzing. It can also stop#processes that run for too long or that output too much data.
apt-get -y install zzuf
# sqlanlz# sqldict# sqldumplogins# sqlquery# sqlupload
# - Penetration# Framework3-MsfC# Framework3-MsfUpdate
# Framework3-Msfcli# Framework3-Msfweb# Init Pgsql (autopwn)# Milw0rm Archive# MsfCli# MsfConsole# MsfUpdate# OpenSSL-To-Open# Update Milw0rm
# - Privilege Escalation
# Ascend attacker
# BitTwist#libpcap-based Ethernet packet generator#Bit-Twist is designed to complement tcpdump, which by itself has done a great#job in capturing network traffic. Bit-Twist can regenerate the captured#traffic onto a live network (the packets are generated from tcpdump trace#file, generating a .pcap file).#
-
8/10/2019 Ubuntu Into a Auditing Machine
13/30
#Bit-Twist also comes with a comprehensive trace file editor to allow to change#the contents of a trace file.##Generally, a packet generator is useful in simulating networking traffic or#scenario, testing firewall, IDS, and IPS, and troubleshooting various network#problems.##The Bit-Twist features are:## * send multiple trace files at a time;# * send packets at a specific speed or line rate in Mbps;# * comprehensive trace file editor with control over most fields in# Ethernet, ARP, IP, ICMP, TCP, and UDP headers with automatic header# checksum correction;# * append user payload to existing packets after a specific header;# * select a specific range of packets and save them in another trace file;# * if you are teaching Computer Networks classes, you may find Bit-Twist# useful as a practical teaching material. It gives your students a# hands-on experience to learn various networking protocols etc.apt-get -y install bittwist
# CDP Spoofer# Cisco Enable Bruteforcer
# Crunch Dictgen# DHCPX Flooder# DNSspoof
# Driftnet#Picks out and displays images from network traffic#Inspired by EtherPEG, Driftnet is a program which listens to network#traffic and picks out images from TCP streams it observes. It is#interesting to run it on a host which sees a lot of web traffic.##(Obviously, this is an invasion of privacy of a fairly blatant sort.#Also, if you are possessed of Victorian sensibilities, and share an
#unswitched network with others who are not, you should probably not#use it.)## Homepage: http://www.ex-parrot.com/~chris/driftnet/apt-get -y install driftnet
# Dsniff#Various tools to sniff network traffic for cleartext insecurities#This package contains several tools to listen to and create network traffic:## * arpspoof - Send out unrequested (and possibly forged) arp replies.# * dnsspoof - forge replies to arbitrary DNS address / pointer queries
# on the Local Area Network.# * dsniff - password sniffer for several protocols.# * filesnarf - saves selected files sniffed from NFS traffic.# * macof - flood the local network with random MAC addresses.# * mailsnarf - sniffs mail on the LAN and stores it in mbox format.# * msgsnarf - record selected messages from different Instant Messengers.# * sshmitm - SSH monkey-in-the-middle. proxies and sniffs SSH traffic.# * sshow - SSH traffic analyser.# * tcpkill - kills specified in-progress TCP connections.# * tcpnice - slow down specified TCP connections via "active"
-
8/10/2019 Ubuntu Into a Auditing Machine
14/30
# traffic shaping.# * urlsnarf - output selected URLs sniffed from HTTP traffic in CLF.# * webmitm - HTTP / HTTPS monkey-in-the-middle. transparently proxies.# * webspy - sends URLs sniffed from a client to your local browser# (requires libx11-6 installed).##Please do not abuse this software.apt-get -y install dsniff
# Etherape#graphical network monitor modeled after etherman#EtherApe is an etherman clone. It displays network activity#graphically. Active hosts are shown as circles of varying size,#and traffic among them is shown as lines of varying width. It's#Gnome and libpcap based.apt-get -y install etherape
# EtterCap#Multipurpose sniffer/interceptor/logger for switched LAN#Ettercap supports active and passive dissection of many protocols#(even ciphered ones) and includes many feature for network and host#analysis.
##Data injection in an established connection and filtering (substitute#or drop a packet) on the fly is also possible, keeping the connection#synchronized.##Many sniffing modes were implemented to give you a powerful and complete#sniffing suite. It's possible to sniff in four modes: IP Based, MAC Based,#ARP Based (full-duplex) and PublicARP Based (half-duplex).##It has the ability to check whether you are in a switched LAN or#not, and to use OS fingerprints (active or passive) to let you know the#geometry of the LAN.apt-get -y install ettercap
# HSRP Spoofer# Hash Collision# Httpcapture# Hydra# Hydra GTK# ICMP Redirect
# ICMPush#ICMP packet builder#icmpush is a tool that builds ICMP packets fully customized
#from command line.##It supports the following ICMP error types: Redirect, Source#Quench, Time Exceeded, Destination Unreach and Parameter#Problem.##And the following ICMP information types: Address Mask Request,#Timestamp, Information Request, Echo Request, Router Solicitation#and Router Advertisement.apt-get -y install icmpush
-
8/10/2019 Ubuntu Into a Auditing Machine
15/30
# IGRP Spoofer# IRDP Responder# IRDP Spoofer
# John the Ripper#active password cracking tool#john, mostly known as John the Ripper, is a tool designed to help systems#administrators to find weak (easy to guess or crack through brute force)#passwords, and even automatically mail users warning them about it, if it#is desired.##It can also be used with different cyphertext formats, including Unix's#DES and MD5, Kerberos AFS passwords, Windows' LM hashes, BSDI's extended DES,#and OpenBSD's Blowfish.##Homepage: http://www.openwall.com/john/apt-get -y install john
# Lodowep
# Medusa#fast, parallel, modular, login brute-forcer for network services#Medusa is intended to be a speedy, massively parallel, modular, login#brute-forcer. The goal is to support as many services which allow remote#authentication as possible. The author considers following items as some of#the key features of this application:# * Thread-based parallel testing. Brute-force testing can be# performed against multiple hosts, users or passwords# concurrently.# * Flexible user input. Target information (host/user/password) can# be specified in a variety of ways. For example, each item can be# either a single entry or a file containing multiple entries.# Additionally, a combination file format allows the user to
# refine their target listing.# * Modular design. Each service module exists as an# independent .mod file. This means that no modifications are# necessary to the core application in order to extend the# supported list of services for brute-forcing.apt-get -y install medusa
# nast#packet sniffer and lan analyzer#Can sniff in normal mode or in promiscuous mode the packets on a network#interface and log it. It dumps the headers of packets and the payload in#ascii or ascii-hex format. You can apply a filter. The sniffed data can
#be saved in a separated file.##As analyzer tool, it has many features like:# * Build LAN hosts list# * Follow a TCP-DATA stream# * Find LAN internet gateways# * Discover promiscuous nodes# * Reset an established connection# * Perform a single half-open portscanner# * Perform a multi half-open portscanner
-
8/10/2019 Ubuntu Into a Auditing Machine
16/30
-
8/10/2019 Ubuntu Into a Auditing Machine
17/30
#to define (spoof) nearly all TCP, UDP, ICMP, IP, ARP, RARP, and Ethernet#header options, Packit can be useful in testing firewalls, intrusion#detection systems, port scanning, simulating network traffic, and general#TCP/IP auditing. Packit is also an excellent tool for learning TCP/IP.apt-get -y install packit
# PHoss
# PackETH#ethernet packet generator#packeth is a GUI packet generator tool for ethernet.#It allows you to create and send any possible packet#or sequence of packets on the ethernet.##You can create and send any ethernet packet. The#supported protocols are: ethernet II, ethernet#802.3, 802.1q, QinQ, ARP, IPv4, UDP, TCP, ICMP,#IGMP, RTP.apt-get -y install packeth
# Rcrack
# sendip#A commandline tool to allow sending arbitrary IP packets#SendIP has a large number of command line options to specify the#content of every header of a RIP, TCP, UDP, ICMP or raw IPv4 and IPv6#packet. It also allows any data to be added to the packet. Checksums#can be calculated automatically, but if you wish to send out wrong#checksums, that is supported too.apt-get -y install sendip
# SIPdump
# SMB Sniffer
# Sing#A fully programmable ping replacement#Sing is a little tool that sends ICMP packets fully customized from command#line. The main purpose is to replace/complement the nice ping command#with certain enhancements as:# - Send fragmented packets (Linux and BSD).# - Send monster packets > 65534 (Linux and BSD).# - Send/read spoofed packets.(Libpcap included in distribution).# - Send many ICMP Information types in addition to the ECHO REQUEST type# sent by default as Address Mask Request, Timestamp, Information Request,
# - Router Solicitation and Router Advertisement.# - Send many ICMP error types: Redirect, Source Quench, Time Exceeded,# Destination Unreach and Parameter Problem.# - Send to host with Loose or Strict Source Routing.# - Use little fingerprinting techniques to discover Windows or Solaris# boxes.# - Send ICMP packets emulating certain OS: Cisco, Solaris, Linux, Shiva,# Unix and Windows at the moment.apt-get -y install sing# Note: sing asks whether to be suid - this response should be scripted
-
8/10/2019 Ubuntu Into a Auditing Machine
18/30
# sucrack#multithreaded su bruteforcer#sucrack is a multithreaded Linux/UNIX tool for cracking local user#accounts via wordlist bruteforcing suapt-get -y install sucrack
# tcpxtract#extracts files from network traffic based on file signatures#tcpxtract is a fast console tool to extract files from network traffic#based on file headers and footers (so called carving).#26 file formats are supported out of the box by tcpxtract but new formats#can be added without problems.#Foremost configurations are simple to convert to tcpxtracts configuration#files.##It uses libpcap and it can be used with tcpdump files.apt-get -y install tcpxtract
# TFTP-Brute# THC PPTP
# TcPick#TCP stream sniffer and connection tracker#This libpcap-based textmode sniffer can:# * track, reassemble and reorder TCP streams# * save the captured flows in different files or display them in the terminal# * display all the stream on the terminal with different display modes like# hexdump, hexdump + ascii, only printable characters, raw mode, colorized# mode ...# * handle several network interface types, including ethernet cards and PPP# interfacesapt-get -y install tcpick
# VNCrack# WebCrack
# Wireshark#network traffic analyzer#Wireshark is a network traffic analyzer, or "sniffer", for Unix and#Unix-like operating systems. A sniffer is a tool used to capture#packets off the wire. Wireshark decodes numerous protocols (too many#to list).#
#This package provides wireshark (the GTK+ version)apt-get -y install wireshark
# Wireshark Wifi# WyD# XSpy
# chntpw
-
8/10/2019 Ubuntu Into a Auditing Machine
19/30
#NT SAM password recovery utility#This little program provides a way to view information and#change user passwords in a Windows NT/2000 userdatabase file.#Old passwords need not be known since they are overwritten.#In addition it also contains a simple registry editor#(same size data writes) and an hex-editor which enables you to#fiddle around with bits and bytes in the file as you wish.##If you want GNU/Linux bootdisks for offline password recovery#you can add this utility to custom image disks or use those provided#at the tools homepage.## Homepage: http://home.eunet.no/~pnordahl/ntpasswd/apt-get -y install chntpw
# bkhive#Dump the syskey bootkey from a Windows NT/2K/XP system hive#This tool is designed to recover the syskey bootkey from a Windows NT/2K/XP#system hive. Then we can decrypt the SAM file with the syskey and dump#password hashes.##Syskey is a Windows feature that adds an additional encryption layer to the#password hashes stored in the SAM database.
apt-get -y install bkhive
# samdump2#Dump Windows 2k/NT/XP password hashes#This tool is designed to dump Windows 2k/NT/XP password hashes from a SAM#file. It requires the syskey key which can be found with tools like bkhive.##Syskey is a Windows feature that adds an additional encryption layer to the#password hashes stored in the SAM database.apt-get -y install samdump2
# - Maintaining Access# 3proxy# Backdoors# Matahari
# CryptCat#TCP/IP swiss army knife extended with twofish encryption#Cryptcat is a simple Unix utility which reads and writes data across#network connections, using TCP or UDP protocol while encrypting the#data being transmitted.#It is designed to be a reliable "back-end" tool that can be used directly
#or easily driven by other programs and scripts. At the same time, it is a#feature-rich network debugging and exploration tool, since it can create#almost any kind of connection you would need and has several interesting#built-in capabilities.apt-get -y install cryptcat
# httptunnel#Tunnels a data stream in HTTP requests.#Creates a bidirectional virtual data stream tunnelled in
-
8/10/2019 Ubuntu Into a Auditing Machine
20/30
#HTTP requests. The requests can be sent via a HTTP proxy#if so desired.apt-get -y install httptunnel
# ICMPTX
# Iodine#tool for tunneling IPv4 data through a DNS server#This is a piece of software that lets you tunnel IPv4 data through a DNS#server. This can be usable in different situations where internet access is#firewalled, but DNS queries are allowed.##iodine is similar to nstx but has password authentication, brings up the#tun interface automatically and lets the user specify the IP address as a#command line option.apt-get -y install iodine
# NSTX#Tunnel IP over DNS#nstx allows you to pass IP packets via DNS queries. This allows you to use
#standard network protocols when otherwise only DNS would be available.apt-get -y install nstx
# Privoxy#Privacy enhancing HTTP Proxy#Privoxy is a web proxy with advanced filtering capabilities for#protecting privacy, filtering web page content, managing cookies,#controlling access, and removing ads, banners, pop-ups and other#obnoxious Internet junk. Privoxy has a very flexible configuration#and can be customized to suit individual needs and tastes. Privoxy#has application for both stand-alone systems and multi-user networks.#
#Privoxy is based on Internet Junkbuster (tm).apt-get -y install privoxy
# tor#anonymizing overlay network for TCP#Tor is a connection-based low-latency anonymous communication system which#addresses many flaws in the original onion routing design.##In brief, Onion Routing is a connection-oriented anonymizing communication#service. Users choose a source-routed path through a set of nodes, and#negotiate a "virtual circuit" through the network, in which each node#knows its predecessor and successor, but no others. Traffic flowing down
#the circuit is unwrapped by a symmetric key at each node, which reveals#the downstream node.##Basically Tor provides a distributed network of servers ("onion#routers"). Users bounce their tcp streams (web traffic, ftp, ssh, etc)#around the routers, and recipients, observers, and even the routers#themselves have difficulty tracking the source of the stream.##Note that Tor does no protocol cleaning. That means there is a danger that#application protocols and associated programs can be induced to reveal
-
8/10/2019 Ubuntu Into a Auditing Machine
21/30
#information about the initiator. Tor depends on Privoxy and similar protocol#cleaners to solve this problem.##Client applications can use the Tor network by connecting to the local#onion proxy. If the application itself does not come with socks support#you can use a socks client such as tsocks. Some web browsers like mozilla#and web proxies like privoxy come with socks support, so you don't need an#extra socks client if you want to use Tor with them.##This package enables only the onion proxy by default, but it can be configured#as a relay (server) node.##Remember that this is development code -- don't rely on the current Tor#network if you really need strong anonymity.##The latest information can be found at http://tor.eff.org/, or on the#mailing lists, archived at http://archives.seul.org/or/talk/ or#http://archives.seul.org/or/announce/.apt-get -y install tor
# ProxyTunnel
# Rinetd#Internet TCP redirection server#rinetd redirects TCP connections from one IP address and port to another,#with basic IP-based access control.##rinetd is a single-process server which handles any number of connections#to the address/port pairs specified in the file /etc/rinetd.conf. Since#rinetd runs as a single process using nonblocking I/O, it is able to#redirect a large number of connections without a severe impact on the#machine. This makes it practical to run services on machines inside an IP#masquerading firewall.apt-get -y install rinetd
# TinyProxy#A lightweight, non-caching, optionally anonymizing http proxy#An anonymizing http proxy which is very light on system resources,#ideal for smaller networks and similar situations where other proxies#(such as Squid) may be overkill and/or a security risk. Tinyproxy can#also be configured to anonymize http requests (allowing for exceptions#on a per-header basis).apt-get -y install tinyproxy
# sbd
# socat#multipurpose relay for bidirectional data transfer#Socat (for SOcket CAT) establishes two bidirectional byte streams#and transfers data between them. Data channels may be files, pipes,#devices (terminal or modem, etc.), or sockets (Unix, IPv4, IPv6, raw,#UDP, TCP, SSL). It provides forking, logging and tracing, different#modes for interprocess communication and many more options.##It can be used, for example, as a TCP relay (one-shot or daemon),
-
8/10/2019 Ubuntu Into a Auditing Machine
22/30
#as an external socksifier, as a shell interface to Unix sockets,#as an IPv6 relay, as a netcat and rinetd replacement, to redirect#TCP-oriented programs to a serial line, or to establish a relatively#secure environment (su and chroot) for running client or server shell#scripts inside network connections.apt-get -y install socat
# - Covering Tracks# Housekeeping
# - Radio Network Analysis# - 802.11# AFrag# ASLeap
# Air Crack NG#wireless WEP/WPA cracking utilities#aircrack-ng is an 802.11a/b/g WEP/WPA cracking program that can recover a#40-bit, 104-bit, 256-bit or 512-bit WEP key once enough encrypted packets have
#been gathered. Also it can attack WPA1/2 networks with some advanced#methods or simply by brute force.##It implements the standard FMS attack along with some optimizations,#thus making the attack much faster compared to other WEP cracking tools.#It can also fully use a multiprocessor system to its full power in order#to speed up the cracking process.##aircrack-ng is a fork of aircrack, as that project has been stopped by#the upstream maintainer.apt-get -y install aircrack-ng
# Air Decap
# Air Replay# Airmon Script# Airpwn# AirSnarf# Airbase# Airodump# Airoscript# Airsnort# CowPatty# FakeAP# GenKeys# Genpmk# Hotspotter
# Karma
# Kismet#Wireless 802.11b monitoring tool#Kismet is a 802.11b wireless network sniffer. It is capable of sniffing#using almost any supported wireless card using the Airo, HostAP, Wlan-NG,#and Orinoco (with a kernel patch) drivers.##Can make use of sox and festival to play audio alarms for network events
-
8/10/2019 Ubuntu Into a Auditing Machine
23/30
#and speak out network summary on discovery. Optionally works with gpsd#to map scanning.apt-get -y install kismet
# MDK2
# MacChanger#utility for manipulating the MAC address of network interfaces#Features:## * set specific MAC address of a network interface# * set the MAC randomly# * set a MAC of another vendor# * set another MAC of the same vendor# * set a MAC of the same kind (eg: wireless card)# * display a vendor MAC list (today, 6200 items) to choose from##Homepage: http://www.alobbs.com/macchangerapt-get -y install macchanger
# MacChanger-GTK
#a GTK+ interface for GNU/MACchanger#MACchanger is an utility for manipulating the MAC#address of network interfaces. This program was#made using Glade and Perl.##Homepage: http://www.mogaal.com/macchanger-gtkapt-get -y install macchanger-gtk
# Unload Drivers# Wep_crack# Wep_decrypt
# WEPLab#tool designed to break WEP keys#WepLab is a tool designed to teach how WEP works, what different#vulnerabilities it has, and how they can be used in practice to#break a WEP protected wireless network.##WepLab can dump network traffic, analyse it or crack the WEP key.apt-get -y install weplab
# WifiTap# Wicrawl
# Wlassistant#User friendly KDE frontend for wireless network connection#Wireless Assistant scans for wireless access points and displays link quality,#encryption and other useful information. When user wants to connect to a#network, Wireless Assistant opens up its wizards and guides the user through#Wi-Fi settings. After a successful connection is made the settings are#remembered so next time the user won't have to enter them again.#
-
8/10/2019 Ubuntu Into a Auditing Machine
24/30
# Homepage: http://wlassistant.sourceforge.net/#apt-get -y install wlassistant#Commented out because homey don't play KDE
# - Bluetooth# Bluebugger# Blueprint# Bluesnarfer
# Btscanner#ncurses-based scanner for Bluetooth devices#btscanner is a tool designed specifically to extract as much information#as possible from a Bluetooth device without the requirement to pair. A#detailed information screen extracts HCI and SDP information, and#maintains an open connection to monitor the RSSI and link quality.#btscanner is based on the BlueZ Bluetooth stack, which is included with#recent Linux kernels, and the BlueZ toolset. btscanner also contains a#complete listing of the IEEE OUI numbers and class lookup tables. Using#the information gathered from these sources it is possible to make#educated guesses as to the host device type.apt-get -y install btscanner
# Carwhisperer# CuteCom# Ghettotooth# HCIDump
# Ussp-Push#Client for OBEX PUSH#This program allows you to send objects using the OBEX PUSH protocol.##The OBEX PUSH protocol is used to transfer files to a mobile device,#generally via Bluetooth or IrDA. THe protocol does not allow any other
#action than sending and generally requires less strict authentication,#which is why it is sometimes preferred to the OBEX FTP protocol (which#allows full filesystem access and is provided by the obexftp package).apt-get -y install ussp-push
# - VOIP & Telephony Analysis# PcapSipDump# PcapToSip_RTP
# SIPSak#SIP Swiss army knife
#sipsak is a small command line tool for developers and administrators of#Session Initiation Protocol (SIP) applications.#It can be used for some simple tests on SIP applications and devices.apt-get -y install sipsak
# SIPcrack# SIPdump# SIPp# Smap
-
8/10/2019 Ubuntu Into a Auditing Machine
25/30
# - Digital Forensics# Allin1
# Autopsy#graphical interface to SleuthKit#The Autopsy Forensic Browser is a graphical interface to the command line#digital forensic analysis tools in The Sleuth Kit. Together, The Sleuth Kit#and Autopsy provide many of the same features as commercial digital forensics#tools for the analysis of Windows and UNIX file systems (NTFS, FAT, FFS,#EXT2FS, and EXT3FS).apt-get -y install autopsy
# chkrootkit#Checks for signs of rootkits on the local system#chkrootkit identifies whether the target computer is infected with a rootkit.#Some of the rootkits that chkrootkit identifies are:# 1. lrk3, lrk4, lrk5, lrk6 (and some variants);# 2. Solaris rootkit;# 3. FreeBSD rootkit;# 4. t0rn (including latest variant);
# 5. Ambient's Rootkit for Linux (ARK);# 6. Ramen Worm;# 7. rh[67]-shaper;# 8. RSHA;# 9. Romanian rootkit;# 10. RK17;# 11. Lion Worm;# 12. Adore Worm.#Please note that this is not a definitive test, it does not ensure that the#target has not been cracked. In addition to running chkrootkit, one should#perform more specific tests.apt-get -y install chkrootkit
# DCFLDD#enhanced version of dd for forensics and security#Based on the dd program with the following additional features:## - Hashing on-the-fly, dcfldd can hash the input data as it is being# transferred, helping to ensure data integrity.# - Status output, dcfldd can update the user of its progress in terms of the# amount of data transferred and how much longer operation will take.# - Flexible disk wipes, dcfldd can be used to wipe disks quickly and with a# known pattern if desired.# - Image/wipe Verify, dcfldd can verify that a target drive is a bit-for-bit# match of the specified input file or pattern.
# - Multiple outputs, dcfldd can output to multiple files or disks at the same# time.# - Split output, dcfldd can split output to multiple files with more# configurability than the split command.# - Piped output and logs, dcfldd can send all its log data and output to# commands as well as files natively.##Homepage: http://dcfldd.sourceforge.net/apt-get -y install dcfldd
-
8/10/2019 Ubuntu Into a Auditing Machine
26/30
# DD_Rescue#copies data from one file or block device to another#dd_rescue is a tool to help you to save data from crashed partition.#It tries to read and if it fails, it will go on with the next sectors#where tools like dd will fail. If the copying process is interrupted#by the user it is possible to continue at any position later.#It can copy backwards.apt-get -y install ddrescue
# Foremost#Forensics application to recover data#This is a console program to recover files based on their headers and#footers for forensics purposes.##Foremost can work on disk image files, such as those generated by dd,#Safeback, Encase, etc, or directly on a drive. The headers and footers#are specified by a configuration file, so you can pick and choose which#headers you want to look for.apt-get -y install foremost
# Magicrescue
#recovers files by looking for magic bytes#Magic Rescue scans a block device for file types it knows how to recover#and calls an external program to extract them. It looks at "magic bytes"#in file contents, so it can be used both as an undelete utility and for#recovering a corrupted drive or partition. As long as the file data is#there, it will find it.apt-get -y install magicrescue
# Mboxgrep#Grep through mailboxes#mboxgrep is a small utility that scans either standard Unix#mailboxes, Gnus nnml or nnmh mailboxes, MH mailboxes or Maildirs,
#and displays messages matching a basic, extended, or#Perl-compatible regular expression.apt-get -y install mboxgrep
# Memfetch# Memfetch Find# Pasco
# Rootkithunter#rootkit, backdoor, sniffer and exploit scanner#Rootkit Hunter scans systems for known and unknown rootkits,
#backdoors, sniffers and exploits.##It checks for:# - MD5 hash changes;# - files commonly created by rootkits;# - executables with anomalous file permissions;# - suspicious strings in kernel modules;# - hidden files in system directories;#and can optionally scan within files.#
-
8/10/2019 Ubuntu Into a Auditing Machine
27/30
#Using rkhunter alone does not guarantee that a system is not#compromised. Running additional tests, such as chkrootkit, is#recommended.apt-get -y install rkhunter
# Sleuthkit#Tools for forensics analysis#The Sleuth Kit (previously known as TASK) is a collection of UNIX-based#command line file system and media management forensic analysis tools.#The file system tools allow you to examine file systems of a suspect#computer in a non-intrusive fashion. Because the tools do not rely on#the operating system to process the file systems, deleted and hidden#content is shown.##The media management tools allow you to examine the layout of disks and#other media. The Sleuth Kit supports DOS partitions, BSD partitions#(disk labels), Mac partitions, and Sun slices (Volume Table of#Contents). With these tools, you can identify where partitions are#located and extract them so that they can be analyzed with file system#analysis tools.##When performing a complete analysis of a system, we all know that#command line tools can become tedious. The Autopsy Forensic Browser is
#a graphical interface to the tools in The Sleuth Kit, which allows you#to more easily conduct an investigation. Autopsy provides case#management, image integrity, keyword searching, and other automated#operations.##The Sleuth Kit's upstream homepage can be found at#http://www.sleuthkit.org/sleuthkit/.apt-get -y install sleuthkit
# unhide#Forensic tool to find hidden processes and ports#Unhide is a forensic tool to find processes and TCP/UDP ports hidden by
#rootkits, Linux kernel modules or by other techniques. It includes two#utilities: unhide and unhide-tcp.##unhide detects hidden processes using three techniques:# - comparing the output of /proc and /bin/ps# - comparing the information gathered from /bin/ps with the one gathered# from system calls (syscall scanning)# - full scan of the process ID space (PIDs bruteforcing)##unhide-tcp identifies TCP/UDP ports that are listening but are not listed in#/bin/netstat through brute forcing of all TCP/UDP ports available.##This package can be used by rkhunter in its daily scans.
apt-get -y install unhide
# Vinetto#A forensics tool to examine Thumbs.db files#A tool intended for forensics examinations. It is a console program to extract#thumbnail images and their metadata from those thumbs.db files generated under#Windows. Used in forensic environments.apt-get -y install vinetto
-
8/10/2019 Ubuntu Into a Auditing Machine
28/30
# - Reverse Engineering
# GDB GNU Debugger#The GNU Debugger#GDB is a source-level debugger, capable of breaking programs at#any specific line, displaying variable values, and determining#where errors occurred. Currently, it works for C, C++, Fortran,#Modula 2 and Java programs. A must-have for any serious#programmer.apt-get -y install gdb
# GDB Console GUI# GDB Server
# GNU DDD#The Data Display Debugger, a graphical debugger frontend#The Data Display Debugger (DDD) is a popular graphical user interface to#UNIX debuggers such as GDB, DBX, XDB, JDB and others. Besides ``usual''#front-end features such as viewing source texts and breakpoints, DDD#provides an interactive graphical data display, where data structures are
#displayed as graphs. Using DDD, you can reason about your application by#watching its data, not just by viewing it execute lines of source code.##Other DDD features include: debugging of programs written in Ada, Bash, C,#C++, Chill, Fortran, Java, Modula, Pascal, Perl and Python; machine-level#debugging; hypertext source navigation and lookup; breakpoint, backtrace,#and history editors; preferences and settings editors; program execution#in terminal emulator window; debugging on remote host; on-line manual;#interactive help on the Motif user interface; GDB/DBX/XDB command-line#interface with full editing, history, and completion capabilities.##This version is linked against Lesstif, an LGPL-ed implementation of Motif.apt-get -y install ddd
# Hexcat#HEX dumping utility#The output consists of 6 columns. The first column contains#the address of the row (in bytes). Columns 2 to 5 contain#the characters in the row represented as hexadecimal bytes.#The last column contains the bytes as printable characters.#If a character is not printable it is replaced by a dot.apt-get -y install hexcat
# Hexedit
#view and edit files in hexadecimal or in ASCII#hexedit shows a file both in ASCII and in hexadecimal.#The file can be a device as the file is not whole read.#You can modify the file and search through it.#You have also copy&paste and save to file functions.#Truncating or appending to the file.#Modifications are shown in bold.## Homepage: http://www.chez.com/prigaux/hexedit.htmlapt-get -y install hexedit
-
8/10/2019 Ubuntu Into a Auditing Machine
29/30
# OllyDBG
# - Services
# SNORT#Flexible Network Intrusion Detection System#Snort is a libpcap-based packet sniffer/logger which can be used as a#lightweight network intrusion detection system. It features rules#based logging and can perform content searching/matching in addition#to being used to detect a variety of other attacks and probes, such#as buffer overflows, stealth port scans, CGI attacks, SMB probes, and#much more. Snort has a real-time alerting capability, with alerts being#sent to syslog, a separate "alert" file, or even to a Windows computer#via Samba.##This package provides the plain-vanilla snort distribution and does not#provide database (available in snort-pgsql and snort-mysql) support.apt-get -y install snort# Note: snort wants to know an IP address range - this response should be scripted
# - Source Code Analysis
# flawfinder#examines source code and looks for security weaknesses#Flawfinder searches through C/C++ source code looking for potential#security flaws and produces a report describing the potential flaws#found in source code, ranking them by likely severity.##Like RATS, Flawfinder reports are not a direct indication of a#vulnerability, but provide a reasonable starting point for performing manual
#security audits in source code.##Flawfinder can also generate differential reports by pointing it to#a patch (diff) file describing the code changes. This way it can be used#to determine if the potential flaws found in code have increased or#decreased after a commit to a source code management system like#CVS or Subversion.## Homepage: http://www.dwheeler.com/flawfinder/apt-get -y install flawfinder
# rats
#Rough Auditing Tool for Security#RATS is a security auditing utility for C, C++, PHP, Perl, and Python#code. RATS scans source code, finding potentially dangerous function calls.#The goal of rats is not to definitively find bugs (yet), but to provide a#reasonable starting point for performing manual security audits.##The initial vulnerability database is taken directly from things that#could be easily found when starting with the book, "Building Secure#Software" by Viega and McGraw.#
-
8/10/2019 Ubuntu Into a Auditing Machine
30/30
#The homepage for rats is:# http://www.fortifysoftware.com/security-resources/rats.jspapt-get -y install rats
# - Data File Analysis
# frackzip#password cracker for zip archives#fcrackzip is a fast password cracker partly written in assembler.#It is able to crack password protected zip files with brute#force or dictionary based attacks, optionally testing with#unzip its results.##It can also crack cpmask'ed images.##Homepage: http://www.goof.com/pcg/marc/fcrackzip.htmlapr-get install fcrackzip
# pdfcrack#PDF files password cracker#pdfcrack is a simple tool for recovering passwords from pdf-documents.#It should be able to handle all pdfs that uses the standard security handler
#but the pdf-parsing routines are a bit of a quick hack so you might stumble#across some pdfs where the parser needs to be fixed to handle.##pdfcrack allows configure the size of the searched password, use an#external wordlist file and save cracking sessions to restore it later.apt-get -y install pdfcrack
#Hunt hjiacking tcp and moreapt-get -y install hunt
# Search terms
#scanner, tcp, snort, smb, inject, honey, attacker, spoofer, crack, sniff, password
else user=`id | cut -d= -f2 | cut -d\( -f2 |cut -d\) -f1` echo echo "Sorry, you are NOT root. you are $user and cannot run this script" echofi
exit 0
top related