弁財天

ゴフマン「専門家を信じるのではなく、自分自身で考えて判断せよ」

BackTrack5R3 update4

BackTrackが放置され、Kali linuxになりARMアーキテクチャもサポートしてもっと強力になってる。なんだかなー。

FinFisher Spyware Presentation Details Leaked
F-Secureが公開したスライド

History and Background of FinFisher
o Research starting was the most goverment used
Intrusion tool worldwide: BackTrack(4 Million downloads)

FinFisherの背景と歴史。
o ほとんどの政府が世界中で使用してる侵入ツール
:BackTrack(4百万ダウンロード)の研究を開始。

政府が侵入ハッキングに使ってるツールだから公開されてる?w

このBackTrackというペネトレーション専用のLinuxの調査がFinSpyが開発された理由。つまり政府向けの国民侵入ツールキット。

BackTrack5R3のGnomeのメニューが最新の攻撃手法なのだ。

0tracenetwork analysis identify live hosts
sh -c "cd /pentest/enumeration/0trace;./0trace.sh;sudo -s"
3proxymaintaining access tuneling
sh -c "cd /pentest/backdoors/3proxy; ./3proxy --help; sudo -s"
acccheckprivilege escalation password attacks online
sh -c "cd /pentest/passwords/acccheck/ && ./acccheck.pl;sudo -s"
acenetwork analysis voip
sh -c "cd /pentest/voip/ace/ && ./ace;sudo -s"
admsnmpnetwork analysis snmp
sh -c "cd /pentest/enumeration/snmp/admsnmp/ && ./ADMsnmp;sudo -s"
airforensics imaging
sh -c "cd /pentest/forensics/air-imager/ && ./install-air-2.0.0; sudo -s"
aircrack-ngwireless exploitation lan
sh -c "cd /pentest/wireless/aircrack-ng ;aircrack-ng;sudo -s"
airmon-ngwireless exploitation lan
sh -c "cd /pentest/wireless/aircrack-ng ;airmon-ng;sudo -s"
airodump-ngwireless exploitation lanbt network analysis wireless lan
sh -c "cd /pentest/wireless/aircrack-ng ;airodump-ng;sudo -s"
alive6network analysis identify live hosts
sh -c "alive6;sudo -s"
alive6network analysis identify live hosts
address6
sh -c "address6;sudo -s"
amapnetwork analysis service fingerprint
sh -c "amap;sudo -s"
android-sdkReverse Engineering
sh -c "cd /pentest/reverse-engineering/android/android-sdk/tools/ && ./android;sudo -s"
apache startHTTPD
httpd-start
sh -c "service apache2 start; sleep 4"
apache stopHTTPD
httpd-stop
sh -c "service apache2 stop; sleep 3"
apache-usersweb analysis crawlers
sh -c "cd /pentest/enumeration/web/apache-users/ && ./apache2.1.pl;sudo -s"
apktoolReverse Engineering
sh -c "cd /pentest/reverse-engineering/android/apktool/ && apktool -h;sudo -s"
arduinomiscellaneous clientsPhysical Exploitation
sh -c "cd /pentest/misc/arduino/ && ./arduino"
armitagenetwork exploitation metasploit
metasploit-armitage
sh -c "armitage"
arpingnetwork analysis identify live hosts
sh -c "arping;sudo -s"
asleapprivilege escalation password attacks offline
sh -c "asleap;sudo -s"
asp-auditorweb assessment vulnerability scannerbt web exploitation scanners
sh -c "cd /pentest/web/asp-auditor/ && ./asp-audit.pl;sudo -s"
atshellwireless exploitation bluetooth
sh -c "cd /pentest/bluetooth/bluediving/tools/ && ./atshell;sudo -s"
autopsyforensics suites.wait
sh -c "cd /pentest/forensics/autopsy/; ./autopsy;sudo -s"
autoscannetwork analysis scanner
sh -c "cd /opt/AutoScan/bin/ && ./autoscan-network"
bbqsqldb assessmentbt db analysisbt db exploit
sh -c "bbqsql;sudo -s"
bednetwork assessment fuzzer
sh -c "cd /pentest/fuzzers/bed/ && ./bed.pl;sudo -s"
BeEF Installersocial exploitation beef
beef-installer
sh -c "beef_install.sh; sudo -s"
BeEFsocial exploitation beef
beef
sh -c "beef_launch.sh; sudo -s"
binwalkReverse Engineering
sh -c "cd /pentest/reverse-engineering/binwalk/ && ./binwalk;sudo -s"
blindelephantweb analysis cms identification
sh -c "cd /pentest/web/blindelephant/src/blindelephant; python ./BlindElephant.py;sudo -s"
bluedivingnetwork analysis wireless bluetoothbt wireless exploitation bluetooth
sh -c "cd /pentest/bluetooth/bluediving/;perl bluedivingNG.pl -h;sudo -s"
bluelogwireless exploitation bluetooth
sh -c "cd /pentest/bluetooth/bluelog/ && ./bluelog -h;sudo -s"
bluemahowireless exploitation bluetooth
sh -c "cd /pentest/bluetooth/bluemaho; python bluemaho.py; sudo -s"
bluepotwireless exploitation bluetooth
sh -c "cd /pentest/bluetooth/bluepot/ && ./run.sh;sudo -s"
bluerangernetwork analysis wireless bluetooth
sh -c "cd /pentest/bluetooth/blueranger/ && ./blueranger.sh;sudo -s"
braanetwork analysis snmp
sh -c "braa;sudo -s"
brute force hitag2RFID ACG
rfidiot-09
sh -c "cd /pentest/rfid/RFIDIOt; ./hitag2brute.py -R RFIDIOt.rfidiot.READER_ACG -l /dev/ttyUSB0 -s 9600;sudo -s"
bruteforce mifareRFID ACG
rfidiot-02
sh -c "cd /pentest/rfid/RFIDIOt; ./bruteforce.py -R RFIDIOt.rfidiot.READER_ACG -l /dev/ttyUSB0 -s 9600;sudo -s"
bruteforce mifareRFID ACG
rfidiot-14
sh -c "cd /pentest/rfid/RFIDIOt; ./loginall.py -R RFIDIOt.rfidiot.READER_ACG -l /dev/ttyUSB0 -s 9600;sudo -s"
bruteforce mifareRFID PCSC
rfidiot-28
sh -c "cd /pentest/rfid/RFIDIOt ;./loginall.py -R RFIDIOt.rfidiot.READER_PCSC;sudo -s"
bt-auditwireless exploitation bluetooth
sh -c "cd /pentest/bluetooth/bt-audit/src/ && ls;sudo -s"
btftpwireless exploitation bluetooth
sh -c "cd /pentest/bluetooth/bluediving/tools/ && ./btftp;sudo -s"
btscannernetwork analysis wireless bluetooth
sh -c "btscanner -h; sudo -s"
bulk-extractorforensics analysis
sh -c "bulk_extractor -h;sudo -s"
burpsuiteweb assessment vulnerability scannerbt web assessment attack proxy
sh -c "cd /pentest/web/burpsuite/;java -jar burpsuite_v1.4.01.jar;sudo -s"
calculate jcop mifare keysRFID ACG
rfidiot-15
sh -c "cd /pentest/rfid/RFIDIOt; ./mifarekeys.py -R RFIDIOt.rfidiot.READER_ACG -l /dev/ttyUSB0 -s 9600;sudo -s"
calculate jcop mifare keysRFID PCSC
rfidiot-29
sh -c "cd /pentest/rfid/RFIDIOt; ./mifarekeys.py -R RFIDIOt.rfidiot.READER_PCSC;sudo -s"
casefileweb analysis osintbt report tools evidence management
sh -c "cd /pentest/misc/casefile/bin/ && ./maltego"
cewlprivilege escalation password attacks online
sh -c "cd /pentest/passwords/cewl/;ruby cewl.rb --help;sudo -s"
chip & pin infoRFID PCSC
rfidiot-24
sh -c "cd /pentest/rfid/RFIDIOt;./ChAP.py;sudo -s"
chkrootkitforensics anti virus
sh -c "cd /pentest/forensics/chkrootkit/ && ./chkrootkit -h;sudo -s"
cisco passwd scannernework assessment cisco
ciscos
sh -c "cd /pentest/cisco/ciscos;./ciscos;sudo -s"
cisco-auditing-toolnework assessment cisco
sh -c "cd /pentest/cisco/cisco-auditing-tool/ && ./CAT;sudo -s"
cisco-global-exploiternetwork exploitation cisco
sh -c "cd /pentest/cisco/cisco-global-exploiter/ && ./cge.pl;sudo -s"
cisco-ocsnework assessment cisco
sh -c "cd /pentest/cisco/ocs && ./ocs ;sudo -s"
cisco-torchnework assessment cisco
sh -c "cd /pentest/cisco/cisco-torch; ./cisco-torch.pl; sudo -s"
cmospwdpassword forensics
sh -c "cd /pentest/passwords/cmospwd/ && ./cmospwd -h;sudo -s"
cms-explorerweb analysis cms identification
sh -c "cd /pentest/enumeration/web/cms-explorer && ./cms-explorer.pl;sudo -s"
continuous select tagRFID ACG
rfidiot-04
sh -c "cd /pentest/rfid/RFIDIOt; ./multiselect.py -R RFIDIOt.rfidiot.READER_ACG -l /dev/ttyUSB0 -s 9600;sudo -s"
continuous select tagRFID PCSC
rfidiot-23
sh -c "cd /pentest/rfid/RFIDIOt ;./multiselect.py -R RFIDIOt.rfidiot.READER_PCSC;sudo -s"
copy iso15693 tagRFID ACG
rfidiot-05
sh -c "cd /pentest/rfid/RFIDIOt; ./copytag.py -R RFIDIOt.rfidiot.READER_ACG -l /dev/ttyUSB0 -s 9600;sudo -s"
copy-router-confignework assessment cisco
sh -c "cd /pentest/cisco/copy-router-config;perl ./copy-router-config.pl;sudo -s"
cowpattyprivilege escalation password attacks offline
sh -c "cowpatty;sudo -s"
creddumpprivilege escalation password attacks offline
sh -c "cd /pentest/passwords/creddump/ && ./pwdump.py;sudo -s"
creepynetwork analysis osint
creepymap
crunchprivilege escalation password attacks offline
sh -c "cd /pentest/passwords/crunch; ./crunch ;sudo -s"
cryptcatmaintaining access tuneling
sh -c "cryptcat -h; sudo -s"
cuppprivilege escalation password attacks offline
sh -c "cd /pentest/passwords/cupp/ && ./cupp.py -h;sudo -s"
cutycaptreport tools media capture
sh -c "cd /pentest/reporting/cutycapt/ && ./CutyCapt --help;sudo -s"
darkmysqliweb exploitation scanners
sh -c "cd /pentest/web/darkmysqli;python ./DarkMySQLi.py -h;sudo -s"
darkstatprivilege escalation nework sniffersbt network forensics
sh -c "cd /pentest/sniffers/darkstat; ./darkstat; sudo -s"
davtestnetwork analysis scanner
sh -c "cd /pentest/scanners/davtest/ && ./davtest.pl;sudo -s"
dbdmaintaining access os backdoors and rootkits
sh -c "cd /pentest/backdoors/dbd/ && ./dbd -h;sudo -s"
dbpwauditdb assessmentbt db analysisbt db exploitbt db oracle assessmentbt db oracle analysisbt db oracle exploit
sh -c "cd /pentest/database/dbpwaudit/ && ./dbpwaudit.sh;sudo -s"
dc3ddforensics imaging
sh -c "dc3dd --help;sudo -s"
ddrescueforensics imaging
sh -c "cd /pentest/forensics/ddrescue/ && ./dd_rescue -h;sudo -s"
deblazeweb analysis crawlers
sh -c "cd /pentest/scanners/deblaze/ && ./deblaze.py;sudo -s"
dedReverse Engineering
sh -c "cd /pentest/reverse-engineering/android/ded/ && ./ded-launcher-0.7.1;sudo -s"
dedectednetwork analysis phone system
sh -c "cd /pentest/telephony/dedected/com-on*; echo '';echo '[*] startup-dedected.sh to begin, then insmod com_on_air_cs.ko';echo ''; ls -l ;sudo -s"
denial6dos ddos stressing network services
sh -c "denial6;sudo -s"
detect-new-ip6network analysis identify live hosts
sh -c "detect-new-ip6;sudo -s"
dex2jarReverse Engineering
sh -c "cd /pentest/reverse-engineering/android/dex2jar/ && ./d2j-dex2jar.sh;sudo -s"
dhcpigdos ddos stressing network services
sh -c "cd /pentest/stressing/dhcpig/ && ./pig.py -h;sudo -s"
dictstatprivilege escalation password attacks offline
sh -c "cd /pentest/passwords/pack && python dictstat.py -h;sudo -s"
dirbweb analysis crawlers
sh -c "cd /pentest/web/dirb/ && ./dirb;sudo -s"
dirbusterweb assessment fuzzer
sh -c "cd /pentest/web/dirbuster && java -jar DirBuster-0.12.jar"
dmitrynetwork analysis service fingerprintbt network analysis route
sh -c "dmitry;sudo -s"
dnmapnetwork analysis identify live hosts
sh -c "cd /pentest/scanners/dnmap/ && ./dnmap_server.py;sudo -s"
dnschefprivilege escalation network spoofing
sh -c "cd /pentest/sniffers/dnschef/ && ./dnschef.py -h;sudo -s"
dnsdict6network analysis dns
sh -c "dnsdict6;sudo -s"
dnsenumnetwork analysis dns
sh -c "cd /pentest/enumeration/dns/dnsenum/ && ./dnsenum.pl ;sudo -s"
dnsmapnetwork analysis dns
sh -c "cd /pentest/enumeration/dns/dnsmap/ && ./dnsmap ;sudo -s"
dnsreconnetwork analysis dns
sh -c "cd /pentest/enumeration/dns/dnsrecon/ && ./dnsrecon.py;sudo -s"
dnstracernetwork analysis dns
sh -c "dnstracer;sudo -s"
dnswalknetwork analysis dns
sh -c "cd /pentest/enumeration/dns/dnswalk/ && ./dnswalk;sudo -s"
dos-new-ip6dos ddos stressing network services
sh -c "dos-new-ip6;sudo -s"
dotdotpwnweb assessment fuzzer
sh -c "cd /pentest/web/dotdotpwn/ && ./dotdotpwn.pl;sudo -s"
dpscanweb analysis cms identification
sh -c "cd /pentest/web/dpscan/ && ./DPScan.py;sudo -s"
driftnetnetwork forensicsbt privilege escalation nework sniffers
sh -c "driftnet -h;sudo -s"
dsniffprivilege escalation nework sniffers
sh -c "dsniff -h;sudo -s"
eapmd5passprivilege escalation password attacks offline
sh -c "eapmd5pass;sudo -s"
easy-credsprivilege escalation nework sniffers
sh -c "cd /pentest/sniffers/easy-creds/ && ./easy-creds.sh;sudo -s"
edb-debuggerReverse Engineering
sh -c "edb"
enumiaxnetwork analysis voip
sh -c "cd /pentest/voip/enumiax/ && ./enumiax;sudo -s"
epassport read write cloneRFID ACG
rfidiot-16
sh -c "cd /pentest/rfid/RFIDIOt;./mrpkey.py -R RFIDIOt.rfidiot.READER_ACG -l /dev/ttyUSB0 -s 9600;sudo -s"
epassport read/write/cloneRFID PCSC
rfidiot-30
sh -c "cd /pentest/rfid/RFIDIOt; ./mrpkey.py -R RFIDIOt.rfidiot.READER_PCSC;sudo -s"
ettercap-gtkprivilege escalation nework sniffers.desktop
sh -c "ettercap -G"
ettercap-gtkprivilege escalation nework sniffers
sh -c "ettercap -G"
ettercap-ngprivilege escalation nework sniffers
ettercap.desktop
sh -c "ettercap -h;sudo -s"
ettercapprivilege escalation nework sniffers
sh -c "ettercap -h;sudo -s"
evtparse.plforensics analysis
sh -c "cd /pentest/forensics/evtparse.pl/ && ./evtparse.pl;sudo -s"
ewfacquireforensics imaging
sh -c "ewfacquire;sudo -s"
ewizardmiscellaneous clients
sh -c "cd /pentest/misc/ewizard/ && java -jar EW-Public-3.3.4.jar;sudo -s"
exiftoolforensics analysis
sh -c "cd /pentest/misc/exiftool/ && ./exiftool;sudo -s"
exploitdb directoryosint exploitation exploitdb
exploitdb-dir
sh -c "cd /pentest/exploits/exploitdb/ && ls;sudo -s"
exploitdb searchosint exploitation exploitdb
exploitdb-search
sh -c "cd /pentest/exploits/exploitdb/ && ./searchsploit;sudo -s"
extundeleteforensics carving
sh -c "extundelete --help;sudo -s"
fake_mipv6privilege escalation network spoofing
fake-mipv6
sh -c "fake_mipv6;sudo -s"
fake_mld26privilege escalation network spoofing
fake-mld26
sh -c "fake_mld26;sudo -s"
fake_mld6privilege escalation network spoofing
fake-mld6
sh -c "fake_mld6;sudo -s"
fake_mldrouter6privilege escalation network spoofing
fake-mldrouter6
sh -c "fake_mldrouter6;sudo -s"
fake_router6privilege escalation network spoofingbt privilege escalation nework sniffers
fake-router6
sh -c "fake_router6;sudo -s"
fasttrack-cliFastTrack
sh -c "cd /pentest/exploits/fasttrack/;./fast-track.py -c;sudo -s"
fasttrack-interactiveFastTrack
fasttrack
sh -c "cd /pentest/exploits/fasttrack/;./fast-track.py -i;sudo -s"
fasttrack-webFastTrack
sh -c "cd /pentest/exploits/fasttrack/;./fast-track.py -g;sudo -s"
fatbackforensics carving
sh -c "fatback;sudo -s"
fcrackzipprivilege escalation password attacks offlinebt password forensics
sh -c "fcrackzip --help;sudo -s"
fern-wifi-crackerwireless exploitation lan
sh -c "cd /pentest/wireless/fern-wifi-cracker/ && python execute.py;sudo -s"
ferretprivilege escalation nework sniffersbt privilege escalation network sniffers voip
sh -c "cd /pentest/sniffers/hamster && ./ferret -h ;sudo -s"
fiercenetwork analysis dns
sh -c "cd /pentest/enumeration/dns/fierce/ && ./fierce.pl -h;sudo -s"
fikedprivilege escalation network spoofingbt network analysis vpn
sh -c "fiked;sudo -s"
fimapweb exploitation scanners
sh -c "cd /pentest/web/fimap/ && python fimap.py -h;sudo -s"
findmyhashprivilege escalation password attacks online
sh -c "cd /pentest/passwords/findmyhash/ && ./findmyhash.py;sudo -s"
Firefox Web BrowserApplicationInternetNetworkWebBrowser
firefox
firefox %u
flasmReverse Engineering
sh -c "cd /pentest/reverse-engineering/flasm/ && ./flasm;sudo -s"
flood_advertise6dos ddos stressing network services
flood-advertise6
sh -c "flood_advertise6;sudo -s"
flood_router6dos ddos stressing network services
flood-router6
sh -c "flood_router6;sudo -s"
foremostforensics carving
sh -c "foremost -h;sudo -s"
format mifare 1k value blocksRFID ACG
rfidiot-08
sh -c "cd /pentest/rfid/RFIDIOt; ./formatmifare1kvalue.py -R RFIDIOt.rfidiot.READER_ACG -l /dev/ttyUSB0 -s 9600;sudo -s"
fpingnetwork analysis identify live hosts
sh -c "fping -h;sudo -s"
fragroutenetwork analysis ids and ips identification
sh -c "fragroute;sudo -s"
fragrouternetwork analysis ids and ips identification
sh -c "fragrouter;sudo -s"
freeradius-wpe setupwireless exploitation lan
freeradius-wpe-initialize
sh -c "cd /pentest/wireless/freeradius-wpe/raddb/certs && ./bootstrap && cp -r * /usr/local/etc/raddb/certs;sudo -s"
freeradius-wpewireless exploitation lan
sh -c "radiusd -X -f;sudo -s"
ftesternetwork analysis ids and ips identification
sh -c "cd /pentest/enumeration/ids/ftester/ && ./ftest;sudo -s"
fuzz_advertise6privilege escalation network spoofing
fake-advertise6
sh -c "fake_advertise6;sudo -s"
fuzz_ip6network assessment fuzzer
fuzz-ip6
sh -c "fuzz_ip6;sudo -s"
gdb.pyReverse Engineering
sh -c "gdb.py -h;sudo -s"
genkeysprivilege escalation password attacks offline
sh -c "genkeys;sudo -s"
genlistmiscellaneous network
sh -c "genlist;sudo -s"
genpmkprivilege escalation password attacks offline
sh -c "genpmk;sudo -s"
gerix-wifi-cracker-ngwireless exploitation lan
sh -c "cd /usr/share/gerix-wifi-cracker-ng/ && ./gerix.py"
getsidsdb oracle assessmentbt db oracle analysisbt db oracle exploit
sh -c "cd /pentest/database/getsids/ && ./getsids;sudo -s"
ghdbweb analysis osint
firefox "http://www.exploit-db.com/google-dorks/"
giskismetnetwork analysis wireless lan
sh -c "giskismet;sudo -s"
golismeroweb analysis crawlers
sh -c "cd /pentest/web/golismero/ && ./GoLismero.py -h;sudo -s"
goofileweb analysis osint
sh -c "cd /pentest/enumeration/google/goofile/ && ./goofile.py -h;sudo -s"
goohostweb assessment osint
sh -c "cd /pentest/enumeration/google/goohost/ && ./goohost.sh;sudo -s"
gooscanweb assessment osint
sh -c "cd /pentest/enumeration/google/gooscan;./gooscan;sudo -s"
gpsd startGPSD
gpsd-start
sh -c "/etc/init.d/gpsd start; sleep 4"
gpsd stopGPSD
gpsd-stop
sh -c "/etc/init.d/gpsd stop; sleep 4"
grabberweb assessment vulnerability scanner
sh -c "cd /pentest/web/grabber/; python grabber.py -h; sudo -s"
grendel-scanweb assessment vulnerability scanner
sh -c "cd /pentest/web/grendel-scan/; ./grendel.sh ; sudo -s"
hamsterprivilege escalation nework sniffersbt privilege escalation nework sniffers voip
sh -c "cd /pentest/sniffers/hamster && ./hamster;sudo -s"
hash-identifierprivilege escalation password attacks offline
sh -c "cd /pentest/passwords/hash-identifier/ && ./hash_id.py;sudo -s"
hashcat-guiprivilege escalation password attacks offline
sh -c "cd /pentest/passwords/hashcat-gui/ && ls;sudo -s"
hashcat-utilsprivilege escalation password attacks offline
sh -c "cd /pentest/passwords/hashcat-utils;ls -lah ;sudo -s"
hashcatprivilege escalation password attacks offline
sh -c "cd /pentest/passwords/hashcat;./hashcat-cli$(file /sbin/init | cut -d ' ' -f 3 | cut -d'-' -f 1).bin --help;sudo -s"
hashdeepforensics hashing
sh -c "hashdeep -h;sudo -s"
hcidumpnetwork analysis wireless bluetooth
bluez-hcidump
sh -c "hcidump --help; sudo -s"
hexeditdigital forensics
sh -c "hexedit -h;sudo -s"
hexinjectnetwork analysis ids and ips identificationbt privilege escalation network spoofing
sh -c "cd /pentest/sniffers/hexinject/ && ./hexinject;sudo -s"
hexorbaseprivilege escalation password attacks online
sh -c "cd /pentest/database/hexorbase/ && python ./execute.py"
honeydsocial exploitation honeypot
sh -c "honeyd --help;sudo -s"
honeydctlsocial exploitation honeypot
sh -c "honeydctl --help;sudo -s"
horstwireless exploitation lan
sh -c "cd /pentest/wireless/horst/ && ./horst -h;sudo -s"
hotpatchmaintaining access os backdoors and rootkits
sh -c "hotpatcher -h;sudo -s"
hping2network analysis identify live hostsbt dos ddos stressing network services
sh -c "hping2 --help;sudo -s"
hping3network analysis identify live hostsbt dos ddos stressing network services
sh -c "hping3 --help;sudo -s"
htexploitweb exploitation scanners
sh -c "cd /pentest/web/htexploit/ && ./htexploit;sudo -s"
httprintnetwork analysis service fingerprint
sh -c "cd /pentest/enumeration/www/httprint/linux/ && ./httprint;sudo -s"
httsquashnetwork analysis service fingerprint
sh -c "cd /pentest/scanners/httsquash; ./httsquash; sudo -s"
hydra-gtkprivilege escalation password attacks online
sh -c "xhydra"
hydraprivilege escalation password attacks online
sh -c "hydra;sudo -s"
iaxflooddos ddos stressing network voip
sh -c "cd /pentest/voip/iaxflood; ./iaxflood; sudo -s"
ida-pro freeReverse Engineering
ida-pro-free.wait
sh -c "wine /root/.wine/drive_c/Program\ Files/IDA\ Free/idag.exe"
identify hf tag typeRFID ACG
rfidiot-42
sh -c "cd /pentest/rfid/RFIDIOt; ./isotype.py -R RFIDIOt.rfidiot.READER_ACG -s 9600 -l /dev/ttyUSB0; sudo -s"
identify hf tag typeRFID PCSC
rfidiot-41
sh -c "cd /pentest/rfid/RFIDIOt; ./isotype.py -R RFIDIOt.rfidiot.READER_PCSC;sudo -s"
identify lf tag typeRFID ACG
rfidiot-13
sh -c "cd /pentest/rfid/RFIDIOt ;./lfxtype.py -R RFIDIOt.rfidiot.READER_ACG -l /dev/ttyUSB0 -s 9600;sudo -s"
ike-scannetwork analysis vpn
sh -c "ike-scan --help;sudo -s"
implementation6network analysis scanner
sh -c "implementation6;sudo -s"
implementation6dnetwork analysis scanner
sh -c "implementation6d;sudo -s"
install atr historical byte applet to jcopRFID PCSC
rfidiot-36
sh -c "cd /pentest/rfid/RFIDIOt; make install-atr;sudo -s"
install ida-pro freeReverse Engineering
install-ida-pro-free
sh -c "cd /pentest/reverse-engineering/ida-pro-free/; wine idafree50.exe; mv /usr/share/applications/backtrack-ida-pro-free.desktop.wait /usr/share/applications/backtrack-ida-pro-free.desktop; rm /usr/share/applications/backtrack-install-ida-pro-free.desktop"
install mifare applet to jcopRFID PCSC
rfidiot-35
sh -c "cd /pentest/rfid/RFIDIOt; make install-mifare;sudo -s"
Install scapy dependenciesmiscellaneous network
scapy-install
sh -c "apt-get install tcpdump graphviz imagemagick python-gnuplot python-crypto python-pyx -y ;sudo -s"
install truecryptanti forensics digital
truecrypt-install
sh -c "/usr/src/truecrypt-7.1a-setup-x*; rm -rf /usr/src/truecrypt-7.1a-setup-*;rm -rf /usr/share/applications/backtrack-truecrypt-install.desktop; mv /usr/share/applications/backtrack-truecrypt.desktop.wait /usr/share/applications/backtrack-truecrypt.desktop"
install vonjeek epassport emulator to jcopRFID PCSC
rfidiot-33
sh -c "cd /pentest/rfid/RFIDIOt; make install-passport;sudo -s"
install vonjeek epassport emulator to nokiaRFID PCSC
rfidiot-34
sh -c "cd /pentest/rfid/RFIDIOt; make install-passport-nokia;sudo -s"
intercepter-ngprivilege escalation network spoofing
sh -c "cd /pentest/sniffers/intercepter-ng/ && ./intercepter_linux -h;sudo -s"
intersectmaintaining access os backdoors and rootkits
sh -c "cd /pentest/backdoors/intersect/ && ./Create.py;sudo -s"
inundatordos ddos stressing network services
sh -c "cd /pentest/stressing/inundator/ && ./inundator.pl -h;sudo -s"
inviteflooddos ddos stressing network voip
sh -c "cd /pentest/voip/inviteflood;./inviteflood --help;sudo -s"
iodinemaintaining access tuneling
sh -c "cd /pentest/backdoors/iodine; ./iodine -h; sudo -s"
ipcalcmiscellaneous network
sh -c "ipcalc --help;sudo -s"
iphoneanalyzerdigital forensics
sh -c "cd /pentest/forensics/iphoneanalyzer/ && java -jar iphoneanalyzer.fat.gui-2.0.2.jar;sudo -s"
isr-evilgradeNetwork Exploitation
sh -c "cd /pentest/exploits/isr-evilgrade; ./evilgrade;sudo -s"
iwarnetwork analysis phone systembt network analysis voip
sh -c "cd /pentest/enumeration/voip/iwar; ./iwar --help;sudo -s"
jadReverse Engineering
sh -c "cd /pentest/reverse-engineering/jad/ && ./jad;sudo -s"
javasnoopReverse Engineering
sh -c "cd /pentest/reverse-engineering/javasnoop/ && ./startup.sh;sudo -s"
jboss-autopwnweb exploitation scanners
sh -c "cd /pentest/exploits/jboss-autopwn/ && ./e.sh -h;sudo -s"
jcop infoRFID ACG
rfidiot-11
sh -c "cd /pentest/rfid/RFIDIOt; ./jcoptool.py -R RFIDIOt.rfidiot.READER_ACG -l /dev/ttyUSB0 -s 9600 INFO;sudo -s"
jcop infoRFID PCSC
rfidiot-26
sh -c "cd /pentest/rfid/RFIDIOt; ./jcoptool.py -R RFIDIOt.rfidiot.READER_PCSC INFO;sudo -s"
jcop mifare read writeRFID ACG
rfidiot-10
sh -c "cd /pentest/rfid/RFIDIOt; ./jcopmifare.py -R RFIDIOt.rfidiot.READER_ACG -l /dev/ttyUSB0 -s 9600;sudo -s"
jcop mifare read/writeRFID PCSC
rfidiot-25
sh -c "cd /pentest/rfid/RFIDIOt; ./jcopmifare.py -R RFIDIOt.rfidiot.READER_PCSC;sudo -s"
jcop set atr historical bytesRFID ACG
rfidiot-12
sh -c "cd /pentest/rfid/RFIDIOt ;./jcopsetatrhist.py -R RFIDIOt.rfidiot.READER_ACG -l /dev/ttyUSB0 -s 9600;sudo -s"
jcop set atr historical bytesRFID PCSC
rfidiot-27
sh -c "cd /pentest/rfid/RFIDIOt; ./jcopsetatrhist.py -R RFIDIOt.rfidiot.READER_PCSC;sudo -s"
jigsawnetwork analysis osint
sh -c "cd /pentest/enumeration/jigsaw/ && ./jigsaw.rb -h;sudo -s"
john the ripperprivilege escalation password attacks offline
john
sh -c "cd /pentest/passwords/john; cat README-backtrack; ls john*; sudo -s"
johnnyprivilege escalation password attacks offline
sh -c "cd /pentest/passwords/johnny/ && ./johnny;sudo -s"
joomscanweb assessment cms vulnerability identification
sh -c "cd /pentest/web/joomscan/ && ./joomscan.pl ;sudo -s"
kautilyamiscellaneous clientsPhysical Exploitation
sh -c "cd /pentest/misc/kautilya/ && ruby1.8 kautilya.rb;sudo -s"
keepnotereport tools evidence managementMiscellaneous
sh -c "keepnote"
keimpxprivilege escalation password attacks online
sh -c "cd /pentest/passwords/keimpx/ && ./keimpx.py -h;sudo -s"
kismetnetwork analysis wireless lan
sh -c "kismet;sudo -s"
lbdnetwork analysis dns
sh -c "cd /pentest/enumeration/web/lbd/ && ./lbd.sh;sudo -s"
letdowndos ddos stressing network services
sh -c "cd /pentest/stressing/letdown/; ./letdown; sudo -s"
lynisnetwork assessment scanner-audit
sh -c "cd /pentest/scanners/lynis/ && ./lynis;sudo -s"
macchangermiscellaneous network
sh -c "macchanger -h;sudo -s"
magicrescueforensics carving
sh -c "magicrescue;sudo -s"
magictreereport tools evidence management
sh -c "cd /pentest/reporting/magictree;java -jar MagicTree-1.1-build1643.jar;sudo -s"
maltegoweb analysis osintbt network analysis dnsbt network analysis smtpbt report tools evidence management
sh -c "maltego"
manglefizzprivilege escalation password attacks offline
sh -c "cd /pentest/passwords/manglefizz/ && ./manglefizz;sudo -s"
mantranetwork assessment scanner
sh -c "cd /pentest/web/mantra/; ./OWASP\ Mantra;sudo -s"
maskgenprivilege escalation password attacks offline
sh -c "cd /pentest/passwords/pack && python maskgen.py -h;sudo -s"
md5deepforensics hashing
sh -c "md5deep -h;sudo -s"
mdk3dos ddos stressing network wireless lan
sh -c "mdk3;sudo -s"
medusaprivilege escalation password attacks online
sh -c "medusa -help;sudo -s"
mercuryReverse Engineering
sh -c "cd /pentest/reverse-engineering/mercury/client/ && ./mercury.py;sudo -s"
merge-router-confignework assessment cisco
sh -c "cd /pentest/cisco/copy-router-config;perl ./merge-router-config.pl;sudo -s"
metagoofilweb assessment osint
sh -c "cd /pentest/enumeration/google/metagoofil/; python ./metagoofil.py;sudo -s"
mirandanetwork analysis service fingerprint
sh -c "cd /pentest/enumeration/miranda; python miranda.py; sudo -s"
miredomaintaining access tuneling
sh -c "miredo --help; sudo -s"
missidentifyforensics analysis
sh -c "missidentify -h;sudo -s"
mitmproxyprivilege escalation web sniffers
sh -c "cd /pentest/sniffers/mitmproxy/ && ./mitmproxy -h;sudo -s"
mitre-cveweb assessment osintbt network assessment osintbt osint exploitation onlinearchive
cve
firefox "http://www.cve.mitre.org"
mopestweb assessment vulnerability scanner
sh -c "cd /pentest/web/mopest/ && perl mopest-2.pl;sudo -s"
mork.plforensics analysis
sh -c "cd /pentest/forensics/mork.pl/ && ./mork.pl;sudo -s"
msfclinetwork exploitation metasploit
metasploit-msfcli
sh -c "msfcli;sudo -s"
msfconsolenetwork exploitation metasploit
metasploit-msfconsole
sh -c "msfconsole;sudo -s"
msfencodemaintaining access os backdoors and rootkitsbt maintaining access web backdoors and rootkits
metasploit-msfencode
sh -c "msfencode -h;sudo -s"
msfpayloadmaintaining access os backdoors and rootkitsbt maintaining access web backdoors and rootkits
metasploit-msfpayload
sh -c "msfpayload -h;sudo -s"
msfupdatenetwork exploitation metasploit
metasploit-msfupdate
sh -c "msfupdate;sudo -s"
multiforcerprivilege escalation password attacks offline
sh -c "cd /pentest/passwords/multiforcer/ && ./New-Multiforcer --help;sudo -s"
multimacmiscellaneous network
sh -c "cd /pentest/misc/multimac/ && ./multimac;sudo -s"
mysql startMySQLD
mysqld-start
sh -c "service mysql start; sleep 4"
mysql stopMySQLD
mysqld-stop
sh -c "service mysql stop; sleep 4"
nbtscannetwork analysis service fingerprint
sh -c "nbtscan;sudo -s"
ncatnetwork analysis service fingerprint
sh -c "ncat -h;sudo -s"
ncrackprivilege escalation password attacks online
sh -c "ncrack;sudo -s"
nessus registernessus
nessus-register
sh -c "firefox http://www.nessus.org/register/ ;sudo -s"
nessus startnessus
nessus
sh -c "/etc/init.d/nessusd start;sudo -s"
nessus user addnessus
nessus-adduser
sh -c "/opt/nessus/sbin/nessus-adduser;sudo -s"
netdiscovernetwork analysis identify live hosts
sh -c "netdiscover -h;sudo -s"
netgear-telnetenableNetwork Exploitation
sh -c "cd /pentest/exploits/netgear-telnetenable/ && python telnetenable.py -h;sudo -s"
netiferanetwork analysis identify live hostsbt network analysis scanner
sh -c "cd /pentest/scanners/netifera;./netifera;sudo -s"
netmasknetwork analysis route
sh -c "netmask -h;sudo -s"
niktoweb assessment vulnerability scanner
sh -c "cd /pentest/web/nikto && ./nikto.pl;sudo -s"
nmapnetwork analysis identify live hostsbt network analysis osfingerprintbt network analysis scannerbt network analysis smtpbt network analysis service fingerprint
sh -c "nmap;sudo -s"
npingnetwork analysis identify live hosts
sh -c "nping;sudo -s"
oclhashcat(ATI)privilege escalation password attacks offline
oclhashcat_ati
sh -c "cd /pentest/passwords/oclhashcat;./oclHashcat$(file /sbin/init | cut -d ' ' -f 3 | cut -d'-' -f 1).bin --help;sudo -s"
oclhashcat(Nvidia)privilege escalation password attacks offline
oclhashcat_nvidia
sh -c "cd /pentest/passwords/oclhashcat;./cudaHashcat$(file /sbin/init | cut -d ' ' -f 3 | cut -d'-' -f 1).bin --help;sudo -s"
oclhashcat+(ATI)privilege escalation gpu
oclhashcat+ati
sh -c "cd /pentest/passwords/oclhashcat+;./oclHashcat-plus$(file /sbin/init | cut -d ' ' -f 3 | cut -d'-' -f 1).bin --help;sudo -s"
oclhashcat+(Nvidia)privilege escalation gpu
oclhashcat+nvidia
sh -c "cd /pentest/passwords/oclhashcat+;./cudaHashcat-plus$(file /sbin/init | cut -d ' ' -f 3 | cut -d'-' -f 1).bin --help;sudo -s"
oclhashcat-lite(ATI)privilege escalation password attacks offline
oclhashcat-lite-ati
sh -c "cd /pentest/passwords/oclhashcat-lite;./oclHashcat-lite$(file /sbin/init | cut -d ' ' -f 3 | cut -d'-' -f 1).bin --help;sudo -s"
oclhashcat-lite(Nvidia)privilege escalation password attacks offline
oclhashcat-lite-nvidia
sh -c "cd /pentest/passwords/oclhashcat-lite;./cudaHashcat-lite$(file /sbin/init | cut -d ' ' -f 3 | cut -d'-' -f 1).bin --help;sudo -s"
ohrwurmnetwork assessment voip fuzzer
sh -c "cd /pentest/voip/ohrwurm/; ./ohrwurm ;sudo -s"
ollydbgReverse Engineering
sh -c "cd /pentest/reverse-engineering/ollydbg && wine ollydbg.exe"
onesixtyonenetwork analysis snmp
sh -c "cd /pentest/enumeration/snmp/onesixtyone/ && ./onesixtyone ;sudo -s"
OpenVAS Adduseropenvas
openvas-adduser
sh -c "openvas-adduser;sudo -s"
Openvas check setupopenvas
openvas-check-setup
sh -c "/pentest/misc/openvas/openvas-check-setup.sh --v5;sudo -s"
OpenVAS Mkcertopenvas
openvas-mkcert
sh -c "openvas-mkcert;sudo -s"
OpenVAS NVT Syncopenvas
openvas-nvt-sync
sh -c "openvas-nvt-sync;sudo -s"
Ophcrack-GUIprivilege escalation password attacks offline
ophcrack-gui
sh -c "ophcrack;sudo -s"
Ophcrackprivilege escalation password attacks offline
ophcrack
sh -c "ophcrack --help;sudo -s"
opwgdb oracle assessmentbt db oracle analysisbt db oracle exploit
sh -c "cd /pentest/database/oat && ./opwg.sh;sudo -s"
oquerydb oracle assessmentbt db oracle analysisbt db oracle exploit
sh -c "cd /pentest/database/oat && ./oquery.sh;sudo -s"
oscannerweb exploitation scannersbt db oracle assessmentbt db oracle analysisbt db oracle exploit
sh -c "cd /pentest/database/oscanner/ && ./oscanner.sh;sudo -s"
osddb oracle assessmentbt db oracle analysisbt db oracle exploit
sh -c "cd /pentest/database/oat && ./osd.sh;sudo -s"
osedb oracle assessmentbt db oracle analysisbt db oracle exploit
sh -c "cd /pentest/database/oat && ./ose.sh;sudo -s"
osvdbweb assessment osintbt network assessment osintbt osint exploitation onlinearchive
firefox "http://osvdb.org"
otnsctldb oracle assessmentbt db oracle analysisbt db oracle exploit
sh -c "cd /pentest/database/oat && ./otnsctl.sh;sudo -s"
owasp-zapweb assessment vulnerability scannerbt web assessment attack proxy
sh -c "cd /pentest/web/owasp-zap/ && ./zap.sh"
p0fnetwork analysis osfingerprintbt network forensics
sh -c "p0f -h;sudo -s"
padbusterweb exploitation scanners
sh -c "cd /pentest/web/padbuster;perl ./padBuster.pl;sudo -s"
parasite6privilege escalation nework sniffers
sh -c "parasite6;sudo -s"
patatorprivilege escalation password attacks online
sh -c "cd /pentest/passwords/patator/ && ./patator.py;sudo -s"
pbnjnetwork analysis identify live hosts
sh -c "scanpbnj;sudo -s"
pcapdumpnetwork analysis wireless lan
sh -c "pcapdump -h;sudo -s"
pcapgetivwireless exploitation lan
sh -c "cd /pentest/wireless/wepcrack;perl ./pcap-getIV.pl -h;sudo -s"
pcscd startPCSCD
pcsc-start
sh -c "/etc/init.d/pcscd start; sleep 4"
pcscd stopPCSCD
pcsc-stop
sh -c "/etc/init.d/pcscd stop; sleep 4"
pdf-parserpdf forensics
sh -c "cd /pentest/forensics/pdf-parser/ && ./pdf-parser.py;sudo -s"
pdfbookram forensics
sh -c "cd /pentest/forensics/pdfbook/ && ./pdfbook.py -h;sudo -s"
pdfidpdf forensics
sh -c "cd /pentest/forensics/pdfid/ && ./pdfid.py -h;sudo -s"
pdgmailram forensics
sh -c "cd /pentest/forensics/pdgmail/ && ./pdgmail.py -h;sudo -s"
peepdfpdf forensics
sh -c "cd /pentest/forensics/peepdf/;python peepdf.py ;sudo -s"
phrasendrescherprivilege escalation password attacks offline
sh -c "cd /pentest/passwords/phrasendrescher/ && ./pd -h;sudo -s"
ping tunnelmaintaining access tuneling
ptunnel
sh -c "cd /pentest/backdoors/ptunnel; ./ptunnel --help; sudo -s"
pipalprivilege escalation password attacks offline
sh -c "cd /pentest/passwords/pipal/ && ./pipal.rb -h;sudo -s"
plecostweb assessment cms vulnerability identification
sh -c "cd /pentest/web/plecost/ && python plecost-0.2.2-9-beta.py;sudo -s"
policygenprivilege escalation password attacks offline
sh -c "cd /pentest/passwords/pack && python policygen.py -h;sudo -s"
powerfuzzerweb assessment fuzzer
sh -c "cd /pentest/web/powerfuzzer/ && ./powerfuzzer.py"
powersploitmaintaining access os backdoors and rootkits
sh -c "cd /pentest/backdoors/powersploit/ && ls -l;sudo -s"
pref.plforensics analysis
sh -c "cd /pentest/forensics/pref.pl/ && ./pref.pl;sudo -s"
protos-sipnetwork assessment voip fuzzer
sh -c "cd /pentest/voip/protos-sip/; java -jar c07-sip-r2.jar -help; sudo -s"
proxychainsmaintaining access tuneling
sh -c "proxychains; sudo -s"
proxystrikeweb assessment vulnerability scanner
sh -c "cd /pentest/web/proxystrike/ && python proxystrike.py;sudo -s"
proxytunnelmaintaining access tuneling
sh -c "proxytunnel --help; sudo -s"
ptkforensics suitesbt ram forensicsbt forensics analysis
sh -c "if [ -d /opt/ptk ];then mv /opt/ptk /var/www;fi ;service apache2 start;service mysql start; firefox http://127.0.0.1/ptk"
pwnatmaintaining access tuneling
sh -c "cd /pentest/tunneling/pwnat/ && ./pwnat -h;sudo -s"
pwntchamiscellaneous web
sh -c "cd /pentest/misc/pwntcha; ./pwntcha --help; sudo -s"
pyritwireless exploitation lan
sh -c "pyrit;sudo -s"
pytbullnetwork analysis ids and ips identification
sh -c "cd /pentest/enumeration/ids/pytbull/ && ./pytbull -h;sudo -s"
rainbowcrack-mtprivilege escalation password attacks offline
sh -c "cd /pentest/passwords/rainbowcrack-mt/ && ./rcracki_mt;sudo -s"
rainbowcrackprivilege escalation password attacks offline
sh -c "cd /pentest/passwords/rainbowcrack/ && ./rcrack;sudo -s"
read acg reader eepromRFID ACG
rfidiot-06
sh -c "cd /pentest/rfid/RFIDIOt ;./eeprom.py -R RFIDIOt.rfidiot.READER_ACG -l /dev/ttyUSB0 -s 9600;sudo -s"
read lf tagRFID ACG
rfidiot-18
sh -c "cd /pentest/rfid/RFIDIOt; ./readlfx.py -R RFIDIOt.rfidiot.READER_ACG -l /dev/ttyUSB0 -s 9600;sudo -s"
read mifareRFID ACG
rfidiot-19
sh -c "cd /pentest/rfid/RFIDIOt ; ./readmifaresimple.py -R RFIDIOt.rfidiot.READER_ACG -l /dev/ttyUSB0 -s 9600;sudo -s"
read mifareRFID PCSC
rfidiot-31
sh -c "cd /pentest/rfid/RFIDIOt; ./readmifaresimple.py -R RFIDIOt.rfidiot.READER_PCSC;sudo -s"
read tagRFID ACG
rfidiot-20
sh -c "cd /pentest/rfid/RFIDIOt ; ./readtag.py -R RFIDIOt.rfidiot.READER_ACG -l /dev/ttyUSB0 -s 9600;sudo -s"
read tagRFID PCSC
rfidiot-32
sh -c "cd /pentest/rfid/RFIDIOt; ./readtag.py -R RFIDIOt.rfidiot.READER_PCSC;sudo -s"
read write clone unique (em4x02)RFID ACG
rfidiot-21
sh -c "cd /pentest/rfid/RFIDIOt; ./unique.py -R RFIDIOt.rfidiot.READER_ACG -l /dev/ttyUSB0 -s 9600;sudo -s"
read write clone unique (em4x02)RFID Frosch
rfidiot-39
sh -c "cd /pentest/rfid/RFIDIOt; ./unique.py -R RFIDIOt.rfidiot.READER_FROSCH -l /dev/ttyUSB0 -s 9600;sudo -s"
readpstforensics analysis
sh -c "readpst;sudo -s"
reaverwireless exploitation lan
sh -c "reaver;sudo -s"
rec-studioReverse Engineering
sh -c "cd /pentest/reverse-engineering/rec-studio/bin/ && ./RecStudioLinux"
recordmydesktopreport tools media capture
recordm-bt.desktop
sh -c "recordmydesktop -h;sudo -s"
recoverjpegforensics carving
sh -c "recoverjpeg;sudo -s"
redfangwireless exploitation bluetooth
red-fang
sh -c "cd /pentest/bluetooth/redfang/ && ./fang -h;sudo -s"
redir6privilege escalation network spoofingbt privilege escalation nework sniffers
sh -c "redir6;sudo -s"
reglookupforensics analysis
sh -c "reglookup;sudo -s"
reset hitag2 tagRFID Frosch
rfidiot-40
sh -c "cd /pentest/rfid/RFIDIOt; ./hitag2reset.py -R RFIDIOt.rfidiot.READER_FROSCH -l /dev/ttyUSB0 -s 9600 CONTROL;sudo -s"
reset q5 tagRFID ACG
rfidiot-17
sh -c "cd /pentest/rfid/RFIDIOt; ./q5reset.py -R RFIDIOt.rfidiot.READER_ACG -l /dev/ttyUSB0 -s 9600 CONTROL ID;sudo -s"
reverseraidernetwork analysis dns
sh -c "cd /pentest/enumeration/reverseraider/; ./reverseraider; sudo -s"
revhosts-cliweb analysis osint
sh -c "cd /pentest/enumeration/web/revhosts && ./revhosts info;sudo -s"
revhostsweb analysis osint-gui
sh -c "cd /pentest/enumeration/web/revhosts && ./revhosts gui"
rfuzzweb assessment fuzzer
sh -c "cd /pentest/fuzzers/rfuzz/; ls; sudo -s"
rifiuti2digital forensics
sh -c "rifiuti2 -h;sudo -s"
rkhunterforensics anti virus
sh -c "rkhunter -h;sudo -s"
rsmurf6dos ddos stressing network services
sh -c "rsmurf6;sudo -s"
rtpbreakprivilege escalation network sniffers voip
sh -c "cd /pentest/voip/rtpbreak/ && ./rtpbreak;sudo -s"
rtpflooddos ddos stressing network voip
sh -c "cd /pentest/voip/rtpflood/ && ./rtpflood;sudo -s"
rtpinjectprivilege escalation voip
sh -c "cd /pentest/voip/rtpinject; python rtpinject.py"
safecopyforensics carving
sh -c "safecopy;sudo -s"
SAINT web daemonsaint
saintd
sh -c "/usr/share/saint/scripts/saintd;sudo -s"
SAINTsaint
saint
sh -c "/usr/share/saint/scripts/saint;sudo -s"
sakis3gmiscellaneous network
sh -c "sakis3gz -h;sudo -s"
samdumppassword forensics
sh -c "cd /pentest/forensics/samdump/ && ./samdump;sudo -s"
samrdumpnetwork analysis smb
sh -c "cd /pentest/python/impacket-examples/ && python samrdump.py;sudo -s"
sapytonetwork exploitation sap
sh -c "cd /pentest/exploits/sapyto/; ./sapyto --help; sudo -s"
sbdmaintaining access os backdoors and rootkits
sh -c "sbd -h;sudo -s"
scalpelforensics carving
sh -c "scalpel -h; echo 'default configuration file: /etc/scalpel/scalpel.conf'; sudo -s"
scapyprivilege escalation nework sniffersbt newtork analysis trafficbt network analysis routebt network analysis scanner
sh -c "scapy;sudo -s"
scrounge-ntfsforensics carving
sh -c "scrounge-ntfs -h;sudo -s"
sctpscannetwork analysis identify live hostsbt network analysis osfingerprint
sh -c "cd /pentest/scanners/sctpscan/ && ./sctpscan;sudo -s"
securityfocusosint exploitation onlinearchive
firefox "http://securityfocus.com"
select tagRFID ACG
rfidiot-03
sh -c "cd /pentest/rfid/RFIDIOt; ./cardselect.py -R RFIDIOt.rfidiot.READER_ACG -l /dev/ttyUSB0 -s 9600;sudo -s"
select tagRFID PCSC
rfidiot-22
sh -c "cd /pentest/rfid/RFIDIOt ;./cardselect.py -R RFIDIOt.rfidiot.READER_PCSC;sudo -s"
sendpees6dos ddos stressing network services
sendpee6
sh -c "sendpees6;sudo -s"
set fdx-b idRFID ACG
rfidiot-07
sh -c "cd /pentest/rfid/RFIDIOt; ./fdxbnum.py -R RFIDIOt.rfidiot.READER_ACG -l /dev/ttyUSB0 -s 9600;sudo -s"
set fdx-b idRFID Frosch
rfidiot-38
sh -c "cd /pentest/rfid/RFIDIOt; ./fdxbnum.py -R RFIDIOt.rfidiot.READER_FROSCH -l /dev/ttyUSB0 -s 9600;sudo -s"
setsocial exploitation set
sh -c "cd /pentest/exploits/set;./set;sudo -s"
setsocial exploitation set
se-toolkit
sh -c "cd /pentest/exploits/set/ && ./set;sudo -s"
setup autopsyforensics suites
setup-autopsy
sh -c "cd /pentest/forensics/autopsy/; make; mv /usr/share/applications/backtrack-autopsy.desktop.wait /usr/share/applications/backtrack-autopsy.desktop; rm /usr/share/applications/backtrack-setup-autopsy.desktop;sudo -s"
sfuzznetwork assessment fuzzer
sh -c "cd /pentest/fuzzers/sfuzz; ./sfuzz; sudo -s"
sha1deepforensics hashing
sh -c "sha1deep -h;sudo -s"
sha256deepforensics hashing
sh -c "sha256deep -h;sudo -s"
shodannewtork assessment osintbt web assessment osint
sh -c "firefox http://www.shodanhq.com"
sickfuzznetwork assessment fuzzer
sh -c "cd /pentest/fuzzers/sickfuzz/; ./sickfuzz.py;sudo -s"
siegedos ddos stressing network services
sh -c "siege;sudo -s"
sip-scannetwork analysis voip
sipscan
sh -c "cd /pentest/voip/sipscan/ && ./sip-scan --help;sudo -s"
sipcrackprivilege escalation password attacks offline
sh -c "cd /pentest/passwords/sipcrack;./sipcrack -h ;sudo -s"
sipdumpprivilege escalation password attacks offline
sh -c "cd /pentest/passwords/sipcrack;./sipdump -h ;sudo -s"
sippdos ddos stressing network voip
sh -c "cd /pentest/voip/sipp/ ; ./sipp ; sudo -s"
sipsakprivilege escalation network spoofing voip
sh -c "sipsak;sudo -s"
skipfishweb assessment vulnerability scanner
sh -c "cd /pentest/web/skipfish/ && ./skipfish -h;sudo -s"
sleuthkitforensics suites
sh -c "echo 'SleuthKit is a collection of tools'; echo 'If you need an interface please use Autopsy...'; sudo -s"
smaliReverse Engineering
sh -c "cd /pentest/reverse-engineering/android/smali/ && java -jar smali/target/smali-1.3.4-dev-jar-with-dependencies.jar;sudo -s"
smapnetwork analysis voip
sh -c "cd /pentest/voip/smap/ && ./smap;sudo -s"
smartphone-pentest-frameworkwireless exploitation gsm
sh -c "cd /pentest/exploits/smartphone-pentest-framework/frameworkconsole/ && ./framework.pl;sudo -s"
smbclientnetwork analysis smb
sh -c "cd /pentest/python/impacket-examples/ && python smbclient.py;sudo -s"
smbexecprivilege escalation password attacks online
sh -c "smbexec;sudo -s"
smtp-user-enumnetwork analysis smtp
sh -c "cd /pentest/enumeration/smtp/smtp-user-enum;./smtp-user-enum.pl -h;sudo -s"
smtprcnetwork analysis smtp
sh -c "smtprc -h;sudo -s"
smtpscannetwork analysis smtp
sh -c "smtpscan -h;sudo -s"
smurf6dos ddos stressing network services
sh -c "smurf6;sudo -s"
sniffjokenetwork analysis ids and ips identification
sh -c "sniffjoke --help; sudo -s"
snmpchecknetwork analysis snmp
sh -c "cd /pentest/enumeration/snmp/snmpcheck && ./snmpcheck-1.8.pl;sudo -s"
snmpenumnetwork analysis snmp
sh -c "cd /pentest/enumeration/snmp/snmpenum/ && ./snmpenum.pl;sudo -s"
snort startSNORT
snort-start
sh -c "service snort start; sleep 4"
snort stopSNORT
snort-stop
sh -c "service snort stop; sleep 4"
socatmaintaining access tuneling
sh -c "socat -h; sudo -s"
spamholesocial exploitation honeypot
sh -c "/pentest/exploits/spamhole/spamhole ;sudo -s"
spikenetwork assessment fuzzer
sh -c "cd /pentest/fuzzers/spike/ && ls;sudo -s"
spooftoophwireless exploitation bluetooth
sh -c "cd /pentest/bluetooth/spooftooph/ && ./spooftooph;sudo -s"
sqlbrutedb mssql assessmentbt db oracle assessmentbt db mssql analysisbt db oracle analysis
sh -c "cd /pentest/database/sqlbrute/ && ./sqlbrute.py;sudo -s"
sqldictprivilege escalation password attacks onlinebt db mssql assessmentbt db mssql analysis
sh -c "cd /pentest/database/sqldict/ && wine sqldict.exe"
sqllhfprivilege escalation password attacks onlinebt db mssql assessmentbt db mssql analysis
sh -c "cd /pentest/database/sqllhf/ && wine SQLLHF.EXE;sudo -s"
sqlmapweb assessment vulnerability scannerbt web exploitation scannersbt db mysql assessmentbt db mssql assessmentbt db oracle assessmentbt db mysql analysisbt db mssql analysisbt db oracle analysisbt db mysql exploitbt db mssql exploitbt db oracle exploit
sh -c "cd /pentest/database/sqlmap/ && ./sqlmap.py --help;sudo -s"
sqlninjaweb exploitation scannersbt db mssql assessmentbt db mssql analysisbt db mssql exploit
sh -c "cd /pentest/database/sqlninja/ && ./sqlninja;sudo -s"
sqlscanweb analysis crawlers
sh -c "cd /pentest/database/sqlscan && ./sqlscan.py;sudo -s"
sqlsusweb exploitation scanners
sh -c "cd /pentest/database/sqlsus/ && ./sqlsus;sudo -s"
sshd startSSH
sshd-start
sh -c "/etc/init.d/ssh start; sleep 4"
sshd stopSSH
sshd-stop
sh -c "/etc/init.d/ssh stop; sleep 4"
ssidsniffnetwork analysis wireless lan
sh -c "ssidsniff -h;sudo -s"
sslcauditnetwork analysis ssl
sh -c "cd /pentest/scanners/sslcaudit/ && ./sslcaudit -h;sudo -s"
ssldumpnetwork analysis ssl
sh -c "ssldump -h;sudo -s"
sslhnetwork analysis sslbt maintaining access tuneling
sh -c "sslh -h;sudo -s"
sslscannetwork analysis service fingerprint
sh -c "sslscan;sudo -s"
sslsniffnetwork analysis ssl
sh -c "sslsniff;sudo -s"
sslstripnetwork analysis sslbt web exploitation scanners
sh -c "cd /pentest/web/sslstrip/ && python sslstrip.py -h;sudo -s"
sslyzenetwork analysis ssl
sh -c "cd /pentest/web/sslyze/ && python sslyze.py ;sudo -s"
Start Greenbone Security Assistantopenvas
start-greenbone-security-assistant
sh -c "gsad -?;sudo -s"
Start Greenbone Security Desktopopenvas
greenbone-security.desktop
sh -c "gsd;sudo -s"
start msfpronetwork exploitation metasploitMiscellaneous
metasploit-msfpro
sh -c "cd /opt/metasploit/ && ./ctlscript.sh start;sudo -s"
Start Openvas Administratoropenvas
start-openvas-administrator
sh -c "openvasad -h;sudo -s"
Start Openvas Cliopenvas
start-openvas-cli
sh -c "omp -?;sudo -s"
Start OpenVAS Manageropenvas
openvas-manager
sh -c "openvasmd -?;sudo -s"
Start OpenVAS Scanneropenvas
start-openvas-scanner
sh -c "openvassd;sudo -s"
statsprocessorprivilege escalation password attacks offline
sh -c "cd /pentest/passwords/statsprocessor/ && ./sp32.bin --help;sudo -s"
stegdetectforensics analysis
sh -c "stegdetect --help; sudo -s"
Stop Greenbone Security Assistantopenvas
stop-greenbone-security-assistant
sh -c "pkill gsad | echo 'Stopping Greenbone Security Assistant';sudo -s"
Stop Openvas Administratoropenvas
stop-openvas-administrator
sh -c "pkill openvasad | echo 'Openvas Administrator Stopped';sudo -s"
Stop Openvas Cliopenvas
stop-openvas-cli
sh -c "pkill omp | echo 'Stopping Openvas Cli';sudo -s"
Stop OpenVAS Manageropenvas
stop-openvas-manager
sh -c "pkill openvasmd;sudo -s"
Stop OpenVAS Scanneropenvas
stop-openvas-scanner
sh -c "pkill openvassd | echo 'OpenVAS Scanner Stopped';sudo -s"
strace.pyReverse Engineering
sh -c "strace.py -h;sudo -s"
stunnel4maintaining access tuneling
sh -c "stunnel -help; sudo -s"
subterfugeprivilege escalation nework sniffers
sh -c "subterfuge -h;sudo -s"
sucrackprivilege escalation password attacks physical
sh -c "man sucrack;sudo -s"
svcrackprivilege escalation password attacks online
sh -c "cd /pentest/voip/sipvicious/ ; ./svcrack.py --help ; sudo -s"
svmapnetwork analysis phone system
sh -c "cd /pentest/voip/sipvicious/ ; ./svmap.py --help; sudo -s"
svreportreport tools evidence management
sh -c "cd /pentest/voip/sipvicious/ ; ./svreport.py --help ; sudo -s"
svwarnetwork analysis identify live hosts
sh -c "cd /pentest/voip/sipvicious/ ; ./svwar.py --help ; sudo -s"
swaksnetwork analysis smtp
sh -c "cd /pentest/enumeration/smtp/swaks/ && ./swaks --support;sudo -s"
t50dos ddos stressing network services
sh -c "t50 --help;sudo -s"
tcpdumpnewtork analysis trafficbt privilege escalation nework sniffers
sh -c "tcpdump -h;sudo -s"
tcpflownetwork forensics
sh -c "tcpflow -h;sudo -s"
tcpreplaynetwork forensics
sh -c "cd /pentest/sniffers/tcpreplay; ls; sudo -s"
tcptraceroutenetwork analysis route
sh -c "tcptraceroute -h;sudo -s"
termineterNetwork Exploitation
sh -c "cd /pentest/exploits/termineter/ && ./termineter.py -h;sudo -s"
test acg lahfRFID ACG
rfidiot-01
sh -c "cd /pentest/rfid/RFIDIOt; ./testlahf.sh;sudo -s"
test frosch readerRFID Frosch
rfidiot-37
sh -c "cd /pentest/rfid/RFIDIOt; ./froschtest.py -R RFIDIOt.rfidiot.READER_FROSCH -l /dev/ttyUSB0 -s 9600;sudo -s"
testdiskforensics carving
sh -c "cd /pentest/forensics/testdisk/ && ./testdisk_static -h;sudo -s"
testssl.shnetwork analysis ssl
sh -c "cd /pentest/scanners/testssl;sh ./testssl.sh --help;sudo -s"
tftp-bruteforcenework assessment ciscobt network exploitation cisco
tftpbruteforce
sh -c "cd /pentest/cisco/tftp-bruteforce;./tftpbrute.pl;sudo -s"
thc-ssl-dosdos ddos stressing network services
sh -c "thc-ssl-dos -h;sudo -s"
thcping6privilege escalation network spoofing
sh -c "thcping6;sudo -s"
thcsslchecknetwork analysis ssl
sh -c "cd /pentest/enumeration/thcsslcheck; wine thcsslcheck.exe; sudo -s"
theharvesterweb assessment osint
sh -c "cd /pentest/enumeration/theharvester/ && python theHarvester.py;sudo -s"
tigerdeepforensics hashing
sh -c "tigerdeep -h;sudo -s"
tinyproxymaintaining access tuneling
sh -c "tinyproxy -h; sudo -s"
tlsslednetwork analysis ssl
sh -c "cd /pentest/enumeration/tlssled/ && ./TLSSLed.sh;sudo -s"
tnscmd10gdb oracle assessmentbt db oracle analysis
sh -c "cd /pentest/database/tnscmd10g/ && ./tnscmd10g.pl;sudo -s"
toobig6privilege escalation network spoofing
sh -c "toobig6;sudo -s"
trace6network analysis identify live hosts
sh -c "trace6;sudo -s"
traceroutenetwork analysis identify live hosts
sh -c "traceroute;sudo -s"
trixd00rmaintaining access os backdoors and rootkits
sh -c "cd /pentest/backdoors/trixd00r/ && ./trixd00r -H;sudo -s"
truecrackprivilege escalation password attacks offline
sh -c "cd /pentest/passwords/truecrack/ && ./truecrack -h;sudo -s"
truecryptanti forensics digital.wait
sh -c "truecrypt;sudo -s"
tsharknewtork analysis trafficbt privilege escalation nework sniffers
sh -c "tshark -h;sudo -s"
twofiprivilege escalation password attacks offline
sh -c "cd /pentest/passwords/twofi/ && ./twofi.rb -h;sudo -s"
u3-pwnmaintaining access os backdoors and rootkitsPhysical Exploitation
sh -c "cd /pentest/backdoors/u3-pwn/ && ./U3-Pwn.py;sudo -s"
ua-testerweb analysis ids and ips identification
sh -c "cd /pentest/enumeration/web/ua-tester/ && ./UAtester.py;sudo -s"
udp.pldos ddos stressing network services
sh -c "cd /pentest/misc/udp-pl;perl ./udp.pl;sudo -s"
udptunnelmaintaining access tuneling
sh -c "cd /pentest/tunneling/udptunnel/ && ./udptunnel;sudo -s"
unetbootinExtra-bt
sh -c "/opt/unetbootin/unetbootin-linux-latest"
unicornscan-pgsql-setupnetwork analysis scanner
unicornscan-psqlsetup
sh -c "cd /pentest/scanners/unicornscan; ./setup-unicornscan.sh; sudo -s"
unicornscannetwork analysis scanner
sh -c "us -h;sudo -s"
uniscanweb assessment vulnerability scanner
sh -c "cd /pentest/web/uniscan/ && ./uniscan.pl;sudo -s"
unix-privesc-checkmaintaining access os backdoors and rootkits
sh -c "cd /pentest/backdoors/unix-privesc-check/ && ./unix-privesc-check;sudo -s"
untidyweb assessment fuzzer
sh -c "cd /pentest/web/untidy/ && cat README;sudo -s"
urlcrazyweb analysis osint
sh -c "cd /pentest/enumeration/web/urlcrazy/ && ./urlcrazy -h;sudo -s"
vegaweb assessment vulnerability scanner
sh -c "cd /pentest/web/vega/ && ./Vega"
vinettoforensics analysis
sh -c "cd /pentest/forensics/vinetto;python ./vinetto --help;sudo -s"
voipctlprivilege escalation network sniffers voip
sh -c "voipctl -h;sudo -s"
voipernetwork assessment voip fuzzer
sh -c "cd /pentest/fuzzers/voip/voiper/ && python fuzzer.py;sudo -s"
voiphoneynetwork analysis voip
sh -c "cd /pentest/voip/voiphoney/ && ./voiphoney;sudo -s"
voiphopperprivilege escalation network spoofing voip
sh -c "cd /pentest/voip/voiphopper; ./voiphopper --help; sudo -s"
voipongprivilege escalation network sniffers voip
sh -c "voipong -h;sudo -s"
volafoxram forensics
sh -c "cd /pentest/forensics/volafox/ && python volafox.py;sudo -s"
w3af consoleweb assessment vulnerability scannerbt web exploitation scanners
w3af-console
sh -c "cd /pentest/web/w3af; ./w3af_console"
w3af guiweb assessment vulnerability scannerbt web exploitation scanners
w3af-gui
sh -c "cd /pentest/web/w3af; ./w3af_gui"
waffitweb analysis ids and ips identification
sh -c "cd /pentest/web/waffit/ && ./wafw00f.py -h;sudo -s"
wapitiweb assessment vulnerability scanner
sh -c "cd /pentest/web/wapiti/; ./wapiti.py --help; sudo -s"
warvoxnetwork analysis phone system
sh -c "cd /pentest/telephony/warvox/; ruby-whine; bin/warvox.rb; sudo -s"
watoboweb assessment vulnerability scanner
sh -c "export PATH=$PATH:/root/.gem/ruby/1.9.2/bin/;watobo_gui.rb;sudo -s"
WBarConfExtraGTKUtility
wbarconf
wbarconf
wceprivilege escalation password attacks online
sh -c "cd /pentest/passwords/wce/ && wine wce.exe -h;sudo -s"
weakivgenwireless exploitation lan
sh -c "cd /pentest/wireless/wepcrack;perl ./WeakIVGen.pl;sudo -s"
webscarabweb assessment vulnerability scanner
sh -c "cd /pentest/web/webscarab && java -jar webscarab-one-20110329-1330.jar;sudo -s"
websecurifyweb exploitation scanners
sh -c "cd /pentest/web/websecurify/; ./runner"
webshag-cliweb analysis crawlersbt web assessment fuzzer
sh -c "cd /pentest/enumeration/web/webshag && ./webshag_cli.py -h;sudo -s"
webshag-guiweb analysis crawlersbt web assessment fuzzer
sh -c "cd /pentest/enumeration/web/webshag && ./webshag_gui.py"
webshellsmaintaining access web backdoors and rootkits
sh -c "cd /pentest/backdoors/web/webshells/ && ls -la;sudo -s"
webslayerweb assessment fuzzer
sh -c "cd /pentest/web/webslayer/ && python WebSlayer.py"
websploitweb exploitation scanners
sh -c "cd /pentest/exploits/websploit/ && ./websploit;sudo -s"
weevelymaintaining access web backdoors and rootkits
sh -c "cd /pentest/backdoors/web/weevely/ && ./weevely.py -h;sudo -s"
wepcrackwireless exploitation lan
sh -c "cd /pentest/wireless/wepcrack;perl ./WEPCrack.pl -h;sudo -s"
wfuzzmiscellaneous web
sh -c "cd /pentest/web/wfuzz/ && ./wfuzz.py;sudo -s"
whatwebweb analysis cms identification
sh -c "cd /pentest/enumeration/web/whatweb/ && ./whatweb --help; sudo -s"
whirlpooldeepforensics hashing
sh -c "whirlpooldeep -h;sudo -s"
wifihoneywireless exploitation lan
sh -c "cd /pentest/wireless/wifi-honey/ && ./wifi_honey.sh -h;sudo -s"
wifitewireless exploitation lan
sh -c "cd /pentest/wireless/wifite/ && ./wifite.py -h;sudo -s"
wiresharknewtork analysis trafficbt privilege escalation nework sniffersbt network forensics
sh -c "wireshark"
wol-enetwork analysis identify live hosts
sh -c "cd /pentest/enumeration/wol-e/ && ./wol-e.py -h;sudo -s"
wstoolweb assessment vulnerability scanner
firefox "http://127.0.0.1/wstool/ws_main.php"
xgpsnetwork analysis wireless lan
xgps
xprobe2network analysis osfingerprint
sh -c "xprobe2 --help;sudo -s"
xspyprivilege escalation nework sniffers
sh -c "cd /pentest/sniffers/xspy/ && ./xspy -h;sudo -s"
xssedweb analysis osint
firefox "http://xssed.com/archive"
xsserweb exploitation scanners
sh -c "cd /pentest/web/xsser/ && python xsser;sudo -s"
xssfuzz-startweb assessment fuzzer
sh -c "/pentest/web/xssfuzz/start-apache.sh"
xssfuzz-stopweb assessment fuzzer
sh -c "/pentest/web/xssfuzz/stop-apache.sh"
xssfuzzweb assessment fuzzer
sh -c "firefox http://localhost:8080/xssfuzz1.1.cgi ;sudo -s"
yersiniaprivilege escalation network spoofing
sh -c "yersinia -h;sudo -s"

投稿されたコメント:

コメント
コメントは無効になっています。