{"id":2,"date":"2012-09-07T21:53:11","date_gmt":"2012-09-07T21:53:11","guid":{"rendered":"http:\/\/www.attackdebris.com\/?page_id=2"},"modified":"2020-11-16T22:12:39","modified_gmt":"2020-11-16T22:12:39","slug":"sample-page","status":"publish","type":"page","link":"https:\/\/www.attackdebris.com\/?page_id=2","title":{"rendered":"Tools \/ Scripts"},"content":{"rendered":"<p>This page provides a few links to tools and scripts that I&#8217;ve created which others may also find a use for.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Tools \/ Scripts<\/strong><\/span><\/p>\n<p><a href=\"https:\/\/www.attackdebris.com\/?p=594\">SSLurry<\/a> &#8211; A quick and dirty .nessus file parser to extract hosts\/services affected by SSL related issues<\/p>\n<p><a href=\"https:\/\/www.attackdebris.com\/?p=335\">Nmap-ssl-parser<\/a> &#8211;\u00a0 a python script designed to query nmap XML output and provide a list of usable ssl services in the format <code>host:port<\/code><\/p>\n<p><a href=\"https:\/\/www.attackdebris.com\/?p=348\">Auto-sslscan<\/a> &#8211; a python script designed to automate the process of conducting ssl scanning via sslcan. The Auto-sslscan script parses an nmap.xml output file, extracts all SSL services and automatically performs an sslscan of them.<\/p>\n<p><a title=\"Babel Scripting Framework (babel-sf)\" href=\"https:\/\/www.attackdebris.com\/?p=182\">Babel Scripting Framework (babel-sf)<\/a> &#8211; a collection of custom scripts to facilitate useful pentest related functions via scripting languages.<\/p>\n<p>All of the following tools are replicated in the following languages &#8211; PowerShell, Perl, Ruby and Python:<\/p>\n<ol>\n<li style=\"padding-left: 60px;\">Portscanner<\/li>\n<li style=\"padding-left: 60px;\">ARPscanner<\/li>\n<li style=\"padding-left: 60px;\">FTP Client<\/li>\n<li style=\"padding-left: 60px;\">WGET Client<\/li>\n<li style=\"padding-left: 60px;\">Bind Metasploit Payload<\/li>\n<li style=\"padding-left: 60px;\">Reverse Metasploit Payload<\/li>\n<\/ol>\n<p><a title=\"Nix-auditor.sh\" href=\"https:\/\/github.com\/attackdebris\/Nix-auditor\" target=\"new\" rel=\"noopener noreferrer\">Nix-auditor.sh<\/a> &#8211; A simple Ubuntu \/ Redhat \/ CentOS and Debian Audit Script.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Metasploit Modules<\/strong><\/span><\/p>\n<p><span class=\"sx\"><a href=\"https:\/\/www.rapid7.com\/db\/modules\/auxiliary\/scanner\/ssh\/cerberus_sftp_enumusers\">auxiliary\/scanner\/ssh\/cerberus_sftp_enumusers<\/a> &#8211; Metasploit module that uses a dictionary to brute force valid usernames from C<\/span><span class=\"sx\">erberus FTP server versions <\/span><span class=\"sx\">older than 6.0.9.0 or 7.0.0.2 <span class=\"sx\">(via SFTP)<\/span>. This flaw is caused by a discrepancy <\/span><span class=\"sx\">in the way the SSH service handles failed logins for valid and invalid u<\/span><span class=\"sx\">sers.<\/span><\/p>\n<p><span class=\"css-truncate css-truncate-target\"><a href=\"https:\/\/www.attackdebris.com\/?p=311\">auxiliary\/gather\/kerberos_enumusers<\/a> &#8211; Metasploit module to enumerate valid Domain Users via Kerberos from an\u00a0 unauthenticated perspective. It utilises the different responses returned by the service for valid and invalid users.<\/span><\/p>\n<p><a href=\"https:\/\/www.rapid7.com\/db\/modules\/exploit\/multi\/http\/jenkins_xstream_deserialize\">exploit\/multi\/http\/jenkins_xstream_deserialize<\/a> &#8211; This module exploits <strong>CVE-2016-0792<\/strong> a vulnerability in Jenkins versions older than 1.650 and Jenkins LTS versions older than 1.642.2 which is caused by unsafe deserialization in XStream with Groovy in the classpath, which allows remote arbitrary code execution. The issue affects default installations. Authentication is not required to exploit the vulnerability<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Resources<\/strong><\/span><\/p>\n<p><a href=\"https:\/\/www.attackdebris.com\/?p=364\">Kerberos username enumeration lists<\/a> &#8211; These lists were created to identify valid domain user usernames\u00a0when targeting large Windows domains. The lists are compiled from the top 500 most common firstname and surname combinations as per the United Kingdom\u2019s Office for National Statistics (ONS).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This page provides a few links to tools and scripts that I&#8217;ve created which others may also find a use for. Tools \/ Scripts SSLurry &#8211; A quick and dirty .nessus file parser to extract hosts\/services affected by SSL related issues Nmap-ssl-parser &#8211;\u00a0 a python script designed to query nmap XML output and provide a &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/www.attackdebris.com\/?page_id=2\">Continue reading<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-2","page","type-page","status-publish","hentry","nodate","item-wrap"],"jetpack_shortlink":"https:\/\/wp.me\/P3MDvd-2","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.attackdebris.com\/index.php?rest_route=\/wp\/v2\/pages\/2","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.attackdebris.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.attackdebris.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.attackdebris.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.attackdebris.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2"}],"version-history":[{"count":28,"href":"https:\/\/www.attackdebris.com\/index.php?rest_route=\/wp\/v2\/pages\/2\/revisions"}],"predecessor-version":[{"id":601,"href":"https:\/\/www.attackdebris.com\/index.php?rest_route=\/wp\/v2\/pages\/2\/revisions\/601"}],"wp:attachment":[{"href":"https:\/\/www.attackdebris.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}