Toolbox

…was man so in der Tasche haben sollte…

setoolkit: The social engineering Toolkit

The Social-Engineer Toolkit (SET) is an open-source penetration testing framework designed for social engineering. SET has a number of custom attack vectors that allow you to make a believable attack in a fraction of time. These kind of tools use human behaviors to trick them to the attack vectors.

whois

Hunter

* https://hunter.io → findet un verifiziert Mailadressen

SHODAN

Meterpreter

tshark

hping3

Perform Packet Crafting Packet crafting is a method to craft a network packet in a specific manner. Packet crafting has been widely used for testing the firewalls, whether they allow the crafted packets or simply block them. Hping3 is a tool that is used for packet crafting.

There are four stages in packet crafting:

  1. Packet Assembly: A packet is fabricated to be sent.
  2. Packet Editing: The fabricated packet is tested and tuned if required.
  3. Packet Playing: After the packet editing phase, the packet is sent to the network.
  4. Packet Analysis: The attacker uses a packet sniffing tool, such as Wireshark, to capture and analyze the packets.

packet crafting

hping3 -F -c 1 -p 80 -s 5150 192.168.0.6

In the output, the target responds with the RST-ACK response. Notice the RA value in the flags field.

hping3 -S -c 1 -p 80 -s 5150 192.168.0.6

Notice that the output is similar to the FIN flag.
Siehe: https://techyrick.com/hping3-full-tutorial-for-dummies-to-pro/

p0f

Scant nach OS-Versionen
Siehe:

scapy.net

dnsrecon

Kali Linux also contains a DNS enumeration tool named DNSRecon. To use DNSRecon, type the following command:

dnsrecon -d practicelabs.com -t axfr

DNSEnum

Next, you can also use another tool named DNSEnum, which also provides similar information to the DNSRecon tool. Type the following command:

dnsenum practicelabs.com

wafw00f

scannt eine Webseite ob sie hinter einer waf Firewall steht

wafw00f http://192.168.0.10

nbtscan

To identify the NetBIOS information, you can use the nbtscan command. Type the following command:

nbtscan -r 192.168.0.0/24

nikto

To scan a Website for vulnerabilities

nikto -host http://192.168.0.10 -o plab.html

lynis

By default, Lynis will perform a local system scan. You have the option to run a normal audit scan or can run the entire system scan. Let’s first run the normal audit scan. Type the following command:

lynis audit system -c

Scarpy

cewl

Hydra

The hydra command takes the following parameters inputs: -t: Defines the number of logins to try simultaneously. -V: Displays each attempt of login and password. -f: Stops the dictionary attack after a suitable match for username and password is found. -l username: Defines a username that needs to be cracked. For example, the bee was the username for the bWAPP application. If you do not know the username, you can use the -L parameter and provide a username list, which is similar to wordlist. -P wordlist: Defines the wordlist containing probable passwords. You can use -p parameter for a single password.The website name or IP address: Defines the Website name or its IP address. Protocol: Defines the services on which the dictionary attack is launched.

hydra -t 5 -V -f -l bee -P /root/Desktop/plab.txt 192.168.0.10 ftp

* https://www.hackingarticles.in/a-detailed-guide-on-hydra/