Skip to content

Latest commit

 

History

History
66 lines (54 loc) · 3.12 KB

Handy Tools.md

File metadata and controls

66 lines (54 loc) · 3.12 KB

Bettercap

Installation

sudo apt update
sudo apt install golang git build-essential libpcap-dev libusb-1.0-0-dev libnetfilter-queue-dev

go get github.com/bettercap/bettercap
cd $GOPATH/src/github.com/bettercap/bettercap
make build 
sudo make install

Starting WebUI on http://127.0.0.1:80

sudo bettercap -caplet http-ui

Taken from https://www.bettercap.org/installation/ & https://www.bettercap.org/usage/

SSL Split

SSLsplit is designed to transparently terminate connections that are redirected to it using a network address translation engine. SSLsplit then terminates SSL/TLS and initiates a new SSL/TLS connection to the original destination address, while logging all data transmitted. Besides NAT based operation, SSLsplit also supports static destinations and using the server name indicated by SNI as upstream destination. SSLsplit is purely a transparent proxy and cannot act as a HTTP or SOCKS proxy configured in a browser.

For SSL and HTTPS connections, SSLsplit generates and signs forged X509v3 certificates on-the-fly, mimicking the original server certificate’s subject DN, subjectAltName extension and other characteristics. SSLsplit has the ability to use existing certificates of which the private key is available, instead of generating forged ones. SSLsplit supports NULL-prefix CN certificates but otherwise does not implement exploits against specific certificate verification vulnerabilities in SSL/TLS stacks.

Example:

sslsplit -k ca.key -c ca.pem -P  https 127.0.0.1 8443  https ::1 8443

MITM PROXY

https://docs.mitmproxy.org/stable/tools-mitmproxy/

Features:

  • Intercept HTTP & HTTPS requests and responses and modify them on the fly
  • Save complete HTTP conversations for later replay and analysis
  • Replay the client-side of an HTTP conversations
  • Replay HTTP responses of a previously recorded server
  • Reverse proxy mode to forward traffic to a specified server
  • Transparent proxy mode on OSX and Linux
  • Make scripted changes to HTTP traffic using Python
  • SSL/TLS certificates for interception are generated on the fly

Hash-identifier

user paste a hash and hash-identifier will tell you what type it is (MD5,SHA-1,...)

Mimikatz

Mimikatz is a great post-exploitation tool written by Benjamin Delpy (gentilkiwi). After the initial exploitation phase, attackers may want to get a firmer foothold on the computer/network. Doing so often requires a set of complementary tools. Mimikatz is an attempt to bundle together some of the most useful tasks that attackers will want to perform.
Taken from https://www.offensive-security.com/metasploit-unleashed/mimikatz/

Getting started:

  1. Gain access and a Meterpreter Shell
  2. Check that we have SYSTEM privilges
  3. getuid
  4. getsystem 1. getuid
  5. Verify Windows Architecture with sysinfo
  6. load mimikatz
  7. help mimikatz

XSSHunter

XSS Hunter allows you to find all kinds of cross-site scripting vulnerabilities, including the often-missed blind XSS. The service works by hosting specialized XSS probes which, upon firing, scan the page and send information about the vulnerable page to the XSS Hunter service.