-
Notifications
You must be signed in to change notification settings - Fork 20
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Fixed resources that have been misplaced
- Loading branch information
Yassir
committed
Apr 11, 2021
1 parent
9a1c069
commit 52a4092
Showing
31 changed files
with
3,167 additions
and
0 deletions.
There are no files selected for viewing
Large diffs are not rendered by default.
Oops, something went wrong.
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,69 @@ | ||
#Modified version of mgeeky's script (https://github.com/mgeeky/Penetration-Testing-Tools/blob/master/networks/smtpvrfy.py) | ||
#!/usr/bin/python | ||
|
||
import socket | ||
import sys | ||
import os | ||
|
||
|
||
def interpret_smtp_status_code(resp): | ||
code = int(resp.split(' ')[0]) | ||
messages = { | ||
250:'Requested mail action okay, completed', | ||
251:'User not local; will forward to <forward-path>', | ||
252:'Cannot VRFY user, but will accept message and attempt delivery', | ||
502:'Command not implemented', | ||
530:'Access denied (???a Sendmailism)', | ||
550:'Requested action not taken: mailbox unavailable', | ||
551:'User not local; please try <forward-path>', | ||
} | ||
if code in messages.keys(): | ||
return '({} {})'.format(code, messages[code]) | ||
else: | ||
return '({} code unknown)'.format(code) | ||
|
||
def vrfy(targetIP, username, timeout): | ||
|
||
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) | ||
s.settimeout(timeout) | ||
|
||
try: | ||
conn = s.connect((targetIP, 25)) | ||
|
||
except socket.error, e: | ||
print '[!] Connection failed with {}:25 - "{}"'.format(targetIP, str(e)) | ||
return False | ||
|
||
try: | ||
print '[+] Service banner: "{}"'.format(s.recv(1024).strip()) | ||
s.send('HELO test@test.com\r\n') | ||
print '[>] Response for HELO from {}:{} - '.format(targetIP, 25) + s.recv(1024).strip() | ||
|
||
except socket.error, e: | ||
print '[!] Failed at initial session setup: "{}"'.format(str(e)) | ||
return False | ||
|
||
s.send('VRFY ' + username + '\r\n') | ||
res = s.recv(1024).strip() | ||
|
||
print '[>] Response from {}:{} - '.format(server, port) + interpret_smtp_status_code(res) | ||
if 'User unknown' in res: | ||
print '[!] User not found.' | ||
elif (res.startswith('25') and username in res and '<' in res and '>' in res): | ||
print '[+] User found: "{}"'.format(res.strip()) | ||
else: | ||
print '[?] Response: "{}"'.format(res.strip()) | ||
|
||
s.close() | ||
|
||
if __name__ == '__main__': | ||
targetIP = sys.argv[1] | ||
f = sys.argv[2] | ||
timeout = 10 | ||
names = [] | ||
with open(f, 'r') as fi: | ||
for a in fi: | ||
names.append(a.strip()) | ||
print '[>] Provided wordlist file with {} entries.'.format(len(names)) | ||
vrfy(targetIP, names, timeout) | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,4 @@ | ||
public | ||
private | ||
manager | ||
|
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1 @@ | ||
Starting Nmap 7.91 ( https://nmap.org ) at 2021-04-11 08:08 EDT |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,53 @@ | ||
[01;33m | ||
_ | ||
\ | | _ | ||
_____ | | _____ ____ _____ ____ _| |_ _____ | ||
(____ | | |(____ | / ___|____ |/ ___|_ _) ___ | | ||
/ ___ | | |/ ___ | ( (___/ ___ | | | |_| ____| | ||
\ ____| \_)_____| \____)_____|_| \__)_____) | ||
[01;90mAuthor: 4UT0M4T0N[00m | ||
|
||
Target has been set as 192.168.2.13 | ||
|
||
[01;32m[1m===== Running dirsearch =====[00m | ||
|
||
[01;31m[1mpython3 resources/dirsearch/dirsearch.py -u http://192.168.2.13 -e php,txt,html,asp | ||
[00m | ||
|
||
[01;32m[1m===== Running Gobuster =====[00m | ||
|
||
[01;31m[1mgobuster dir -u http://192.168.2.13 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt | ||
[00m | ||
=============================================================== | ||
Gobuster v3.1.0 | ||
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart) | ||
=============================================================== | ||
[+] Url: http://192.168.2.13 | ||
[+] Method: GET | ||
[+] Threads: 10 | ||
[+] Wordlist: /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt | ||
[+] Negative Status codes: 404 | ||
[+] User Agent: gobuster/3.1.0 | ||
[+] Timeout: 10s | ||
=============================================================== | ||
2021/04/11 08:08:41 Starting gobuster in directory enumeration mode | ||
=============================================================== | ||
|
||
[01;32m[1m===== Running Dirb =====[00m | ||
|
||
[01;31m[1mdirb http://192.168.2.13 /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -w | ||
[00m | ||
|
||
----------------- | ||
DIRB v2.22 | ||
By The Dark Raver | ||
----------------- | ||
|
||
START_TIME: Sun Apr 11 08:08:51 2021 | ||
URL_BASE: http://192.168.2.13/ | ||
WORDLIST_FILES: /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt | ||
OPTION: Not Stopping on warning messages | ||
|
||
----------------- | ||
|
||
*** Generating Wordlist... |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,36 @@ | ||
[01;33m | ||
_ | ||
\ | | _ | ||
_____ | | _____ ____ _____ ____ _| |_ _____ | ||
(____ | | |(____ | / ___|____ |/ ___|_ _) ___ | | ||
/ ___ | | |/ ___ | ( (___/ ___ | | | |_| ____| | ||
\ ____| \_)_____| \____)_____|_| \__)_____) | ||
[01;90mAuthor: 4UT0M4T0N[00m | ||
|
||
Target has been set as 192.168.2.13 | ||
|
||
[01;32m[1m===== Running dirsearch =====[00m | ||
|
||
[01;31m[1mpython3 resources/dirsearch/dirsearch.py -u https://192.168.2.13 -e php,txt,html,asp | ||
[00m | ||
|
||
[01;32m[1m===== Running Gobuster =====[00m | ||
|
||
[01;32m[1m===== Running Dirb =====[00m | ||
|
||
[01;31m[1mdirb https://192.168.2.13 /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -w | ||
[00m | ||
|
||
----------------- | ||
DIRB v2.22 | ||
By The Dark Raver | ||
----------------- | ||
|
||
START_TIME: Sun Apr 11 08:08:41 2021 | ||
URL_BASE: https://192.168.2.13/ | ||
WORDLIST_FILES: /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt | ||
OPTION: Not Stopping on warning messages | ||
|
||
----------------- | ||
|
||
*** Generating Wordlist... |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,75 @@ | ||
[01;33m | ||
_ | ||
\ | | _ | ||
_____ | | _____ ____ _____ ____ _| |_ _____ | ||
(____ | | |(____ | / ___|____ |/ ___|_ _) ___ | | ||
/ ___ | | |/ ___ | ( (___/ ___ | | | |_| ____| | ||
\ ____| \_)_____| \____)_____|_| \__)_____) | ||
[01;90mAuthor: 4UT0M4T0N[00m | ||
|
||
Target has been set as 192.168.2.13 | ||
|
||
[01;32m[1m===== Running Quick Nmap TCP CONNECT scan ======[00m | ||
[01;31m[1mnmap -sT -Pn --top-ports 100 -T4 --reason -v 192.168.2.13 | ||
[00m | ||
Starting Nmap 7.91 ( https://nmap.org ) at 2021-04-11 08:08 EDT | ||
Initiating Parallel DNS resolution of 1 host. at 08:08 | ||
Completed Parallel DNS resolution of 1 host. at 08:08, 0.00s elapsed | ||
Initiating Connect Scan at 08:08 | ||
Scanning desktop-nromt5i.home (192.168.2.13) [100 ports] | ||
Discovered open port 443/tcp on 192.168.2.13 | ||
Discovered open port 5357/tcp on 192.168.2.13 | ||
Completed Connect Scan at 08:08, 2.61s elapsed (100 total ports) | ||
Nmap scan report for desktop-nromt5i.home (192.168.2.13) | ||
Host is up, received user-set (0.00063s latency). | ||
Not shown: 98 filtered ports | ||
Reason: 98 no-responses | ||
PORT STATE SERVICE REASON | ||
443/tcp open https syn-ack | ||
5357/tcp open wsdapi syn-ack | ||
|
||
Read data files from: /usr/bin/../share/nmap | ||
Nmap done: 1 IP address (1 host up) scanned in 2.68 seconds | ||
|
||
[01;32m[1m===== Running Nmap UDP scan ======[00m | ||
[01;31m[1mnmap -sU -Pn --top-ports 100 -T4 -v 192.168.2.13 | ||
[00m | ||
Starting Nmap 7.91 ( https://nmap.org ) at 2021-04-11 08:08 EDT | ||
Initiating ARP Ping Scan at 08:08 | ||
Scanning 192.168.2.13 [1 port] | ||
Completed ARP Ping Scan at 08:08, 0.08s elapsed (1 total hosts) | ||
Initiating Parallel DNS resolution of 1 host. at 08:08 | ||
Completed Parallel DNS resolution of 1 host. at 08:08, 0.00s elapsed | ||
Initiating UDP Scan at 08:08 | ||
Scanning desktop-nromt5i.home (192.168.2.13) [100 ports] | ||
Completed UDP Scan at 08:08, 3.06s elapsed (100 total ports) | ||
Nmap scan report for desktop-nromt5i.home (192.168.2.13) | ||
Host is up (0.000095s latency). | ||
All 100 scanned ports on desktop-nromt5i.home (192.168.2.13) are open|filtered | ||
MAC Address: C8:D9:D2:EA:EE:6B (Hewlett Packard) | ||
|
||
Read data files from: /usr/bin/../share/nmap | ||
Nmap done: 1 IP address (1 host up) scanned in 3.25 seconds | ||
Raw packets sent: 201 (11.262KB) | Rcvd: 26 (1.416KB) | ||
|
||
[01;32m[1m===== Running Full Nmap TCP CONNECT scan ======[00m | ||
[01;31m[1mnmap -sT -Pn -A -p- -T4 -v 192.168.2.13 | ||
[00m | ||
Starting Nmap 7.91 ( https://nmap.org ) at 2021-04-11 08:08 EDT | ||
NSE: Loaded 153 scripts for scanning. | ||
NSE: Script Pre-scanning. | ||
Initiating NSE at 08:08 | ||
Completed NSE at 08:08, 0.00s elapsed | ||
Initiating NSE at 08:08 | ||
Completed NSE at 08:08, 0.00s elapsed | ||
Initiating NSE at 08:08 | ||
Completed NSE at 08:08, 0.00s elapsed | ||
Initiating ARP Ping Scan at 08:08 | ||
Scanning 192.168.2.13 [1 port] | ||
Completed ARP Ping Scan at 08:08, 0.07s elapsed (1 total hosts) | ||
Initiating Parallel DNS resolution of 1 host. at 08:08 | ||
Completed Parallel DNS resolution of 1 host. at 08:08, 0.00s elapsed | ||
Initiating Connect Scan at 08:08 | ||
Scanning desktop-nromt5i.home (192.168.2.13) [65535 ports] | ||
Discovered open port 443/tcp on 192.168.2.13 | ||
Connect Scan Timing: About 23.85% done; ETC: 08:10 (0:01:39 remaining) |
Oops, something went wrong.