Skip to content

Offensive Resource_Files | Dependencies

pedro ubuntu edited this page Aug 11, 2019 · 33 revisions

Description

script dependencies
handler.rc metasploit
brute_force.rc metasploit ; nmap
manage_db.rc metasploit ; nmap
mssql_brute.rc metasploit ; nmap
telnet_brute.rc metasploit ; nmap
ssh_brute.rc metasploit ; nmap
postgres_brute.rc metasploit ; nmap
mysql_brute.rc metaploit ; nmap
snmp_exploiter.rc metasploit ; nmap
ms17_010.rc metasploit ; nmap
winrm_brute.rc metasploit ; nmap
http_CVE.rc metasploit ; nmap ; freevulnsearch.nse
geo_location.rc metasploit ; nmap ; geoiplookup (OR: curl ipapi.co)
mass_exploiter.rc metasploit ; nmap ; geoiplookup
post_exploitation.rc metasploit ; nmap ; freevulnsearch.nse ; enum_protections.rb ; SCRNSAVE_T1180_persistence.rb ; linux_hostrecon.rb




Install ALL dependencies (install.sh)

  git clone https://github.com/r00t-3xp10it/resource_files.git
  cd resource_files/aux
  sudo chmod +x install.sh
  sudo ./install.sh

pic

  • Check for updates

    sudo ./install.sh -u
    
    • The -u (update) script argument will compare the remote repository againts local repository version file (resource_files/bin/version) and download/install any of my metasploit post-exploitation modules or resource scripts if any updates are available.

pic




Install dependencies (manually)

  • freevulnsearch.nse (nmap)
    • Description: Nmap script to check for possible CVE's present in target system.
    • Resource scripts that requires it: http_CVE.rc ; post_exploitation.rc
    • Download/Install instructions (execute in terminal):
  sudo wget https://raw.githubusercontent.com/OCSAF/freevulnsearch/master/freevulnsearch.nse
  sudo cp freevulnsearch.nse /usr/share/nmap/scripts/freevulnsearch.nse
  sudo nmap --script-updatedb

  • enum_protections.rb (metasploit)
    • Description: Metasploit post-exploitation module to enumerate target system protections
    • Resource scripts that requires it: post_exploitation.rc
    • Download/Install instructions (execute in terminal):
  sudo service postgresql start
  sudo wget https://raw.githubusercontent.com/r00t-3xp10it/resource_files/master/aux/enum_protections.rb
  path=$(locate modules/post/windows/recon | grep -v '\doc' | grep -v '\documentation' | head -n 1)
  sudo cp enum_protections.rb $path/enum_protections.rb
  sudo msfconsole -q -x 'db_status;reload_all;exit -y'

  • SCRNSAVE_T1180_persistence.rb (metasploit)
    • Description: Metasploit post-exploitation module to persiste a payload in target system
    • Resource scripts that requires it: post_exploitation.rc
    • Download/Install instructions (execute in terminal):
  sudo service postgresql start
  sudo wget https://raw.githubusercontent.com/r00t-3xp10it/resource_files/master/aux/SCRNSAVE_T1180_persistence.rb
  path=$(locate modules/post/windows/escalate | grep -v '\doc' | grep -v '\documentation' | head -n 1)
  sudo cp SCRNSAVE_T1180_persistence.rb $path/SCRNSAVE_T1180_persistence.rb
  sudo msfconsole -q -x 'db_status;reload_all;exit -y'

  • linux_hostrecon.rb (metasploit)
    • Description: Metasploit post-exploitation module to enumerate target system information
    • Resource scripts that requires it: post_exploitation.rc
    • Download/Install instructions (execute in terminal):
  sudo service postgresql start
  sudo wget https://raw.githubusercontent.com/r00t-3xp10it/resource_files/master/aux/linux_hostrecon.rb
  path=$(locate modules/post/linux/gather | grep -v '\doc' | grep -v '\documentation' | head -n 1)
  sudo cp linux_hostrecon.rb $path/linux_hostrecon.rb
  sudo msfconsole -q -x 'db_status;reload_all;exit -y'

  • install geoiplookup (geo_location.rc)
    • Description: geoiplookup package its used to find the geolocation of IP address(s) (WAN)
    • Resource scripts that requires it: geo_location.rc
    • Download/Install instructions (execute in terminal):
  sudo apt-get update && apt-get install geoip-bin



Jump to wiki description

Suspicious Shell Activity @2019