This time i will show you, how to install Aircrack-ng on CentOS 7. My CentOS 7 (CentOS Linux release 7.2.1511 x64) is a virtual maschine on VirtualBox (5.0). As wireless USB Adapter i use TP-Link TL-WN822N.
This time i will present 2 tutorials in one. One part describe how to create a simple Python package. The other part gives security testers a hint for sensible data. It is recommended to work with python virtualenv!
Preconditions
Python 2.7.x
pip, virtualenv, setuptools
Skype
Background
Skype stores sensible data, unencrypted, in a simple sqlite database (main.db). You would be surprised what information can be found there!
Example Locations
Mac OS – /Users/Library/Application Support/Skype/main.db
Windows – C:\Documents and Settings\Application Data\Skype\main.db
One way of finding out subdomains are wordlists. Knockpy offers exactly this possibility! It is written in Python, easy to install and to use. The usage of own wordlists is possible, too. The output displayed in the terminal and saved in CSV file.
Precondition
Python installed
Installation
# install with pip
$ sudo pip install https://github.com/guelfoweb/knock/archive/knock3.zip
Usage
# usage with internal wordlist
$ knockpy domain.com
# usage with own wordlist
$ knockpy domain.com -w wordlist.txt
# resolve domain name
$ knockpy -r domain.com
# check zone transfer
$ knockpy -r domain.com
As a penetration tester you may need to check your FTP Server(s). One possibilty is brute-force passwords to auditing. This tutorial show you how easy you can use Python to create such a tool.
It is time again for an extensive tutorial. This time, a tiny test application for passive and active information gathering. After the instruction you are welcome to improve the application with more features! Okay let’s start…
What should it do?
The security tester selects a information gathering method first. As second step the testers insert the URL or IP in a testfield and press a button. The result should printed out in a text area. The GUI should look like this:
How it is implemented?
The prefered language is Python 2.7. So it is portable to different OS and for the most of methods are already packages available. The GUI is done with Tkinter. Tkinter provides all objects which are needed as widgets and ranges for this scope out completely. The file and folder structure look like:
There are a lot of different services where you can ask the Geolocation for IP and/or Domains. With python it is very easy to make requests on that APIs. As security tester you can use it on the discovery term.
Example:
#!/usr/bin/env python
# -*- coding: utf-8 -*-
import requests
import sys
class GeoLocation(object):
def __init__(self):
self.url = 'http://ip-api.com/json/'
def parse_args(self):
self.url = self.url + sys.argv[1]
def get_args(self):
usr_input = raw_input("Insert ip/url: ")
if not usr_input:
sys.exit(1)
else:
self.url = self.url + usr_input
def show_results(self):
response = requests.get(self.url)
output = response.json()
for key, val in output.items():
if val:
print key, "=>", val
if __name__ == '__main__':
RUN = GeoLocation()
if len(sys.argv) < 2:
RUN.get_args()
else:
RUN.parse_args()
RUN.show_results()