当前位置:网站首页>Personal developed penetration testing tool Satania v1.2 update

Personal developed penetration testing tool Satania v1.2 update

2022-07-05 05:32:00 Ba1_ Ma0

Satania v1.2

 Insert picture description here

Github Project address :

https://github.com/baimao-box/satania

 Insert picture description here

This is a semi-automatic penetration testing tool , The current version is mainly used for information collection of penetration test , Keep updated weekly , The ultimate goal is something like linpeas Automatic penetration test information collection tool , And detect what vulnerabilities exist

Major updates

BUG Repair 
smb Specify an account to log in to the folder 
 Interface optimization , Program optimization 
 Generate shellcode And connect 
 Joined the WPScan Tools 

install

git library :

git clone https://github.com/baimao-box/satania.git

After downloading the tool , Enter the directory where the tool exists to install

chmod 777 setup.py
python3 setup.py

 Insert picture description here
It takes a few minutes , During this period, you need to manually select some things , The default can be

After installation , Will prompt whether to install searchsploit Tools , This tool is very big , So ask here , If the network is good, you can install

 Insert picture description here

Then directly enter satania You can run the tool

 Insert picture description here

Tool module introduction

 Insert picture description here

nmap enumeration

1.nmap enumeration 
2.nmap Regular vulnerability scanning 
3.nmap Intranet survival host detection 

Site enumeration

4. Website root directory file scanning 
5. Website subdomain name enumeration 
6. Website framework enumeration 
7.wpscan enumeration 
	1.WPScan Vulnerability scanning 
	2.WPScan User name enumeration 
	3.WPScan Account blasting 

smb enumeration

8.smb Shared directory enumeration 
9. Anonymous logins 
10.smb Specify folder login 
11.smb Specify the user name to log in 

MFS enumeration

12.nfs scanning 
13.nfs Local mount 

shellcode

14.msfvenom Generate shellcode
	1.aspx Of shellcode
	2.php Of shellcode
	3.exe Of shellcode
	4.netcat monitor 
	5. Change the local settings ip And port 
15. Connect the uploaded shellcode

other

16. Change target ip
17.searchsploit
18. Get this machine again IP
19. sign out 

During the execution of the command , It still works linux command

 Insert picture description here

Some demos for this update

 Update as follows :
BUG Repair 
smb Specify an account to log in to the folder 
 Interface optimization , Program optimization 
 Generate shellcode And connect 
 Joined the WPScan Tools 

Use wpscan Enumeration module , Perform default vulnerability scanning

 Insert picture description here
Here you will be asked to enter api token

 Insert picture description here

We usually use wpscan when , Each scan requires input api token, Using this tool , You can put your api token Store it , Then the call does not need to enter

Then you can perform various scans

We enter msfvenom modular

 Insert picture description here

The tool will prompt you to enter local ip And listening port , For the following shellcode Generate , Now we generate a shellcode

 Insert picture description here

The tool will enter the file name , Storage address , And the use of payload

This update will execute linux The command is placed below

 Insert picture description here

Keep updating every week

原网站

版权声明
本文为[Ba1_ Ma0]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/186/202207050527466688.html