230 likes | 633 Views
Heybe – Penetration Testing Toolkit. BlackHat Arsenal 201 4 - USA. Agenda. Pen etration Test Phases. Pentest Types. Internal Pentest External Pentest Web Application Tests Database Test Social Engineering DDoS Tests Active Directory Wifi Tests ….
E N D
BahtiyarBircan (bahtiyarb@gmail.com), Gökhan ALKAN (cigalkan@gmail.com) https://github.com/heybe https://github.com/galkan/sees https://github.com/galkan/depdep https://github.com/galkan/sees https://github.com/galkan/kacak https://github.com/galkan/fener https://github.com/galkan/crowbar Heybe – Penetration Testing Toolkit BlackHatArsenal 2014 - USA
Agenda BlackHat Arsenal USA – 2014
Penetration Test Phases BlackHat Arsenal USA – 2014
Pentest Types • Internal Pentest • External Pentest • Web Application Tests • Database Test • Social Engineering • DDoS Tests • Active Directory • WifiTests • … BlackHat Arsenal USA – 2014
Some Problems During Pentests • Very large networks • Limited time • Forgetting tosaveresults • Scan reports • Screenshots • NonstandardNmapparameters • Bruteforce unusual applications BlackHat Arsenal USA – 2014
HEYBE BlackHat Arsenal USA – 2014
HEYBE • Open sourcetoolkitforpentestautomation • Codeavailable on Github • https://github.com/heybe • https://github.com/galkan/sees • https://github.com/galkan/depdep • https://github.com/galkan/sees • https://github.com/galkan/kacak • https://github.com/galkan/levye • https://github.com/galkan/fener • Publishedat Blackhat USA 2014 BlackHat Arsenal USA – 2014
WHY? • Automate and speed upboring/standard steps • More time for fun like SE • Standardize test results • Save resultsfor reporting BlackHat Arsenal USA – 2014
HOW? BlackHat Arsenal USA – 2014
WHAT? BlackHat Arsenal USA – 2014
Penetration Test Phases – Heybe BlackHat Arsenal USA – 2014
Fener • Information Gathering & Recon Tool • https://github.com/heybe/fener • 3 Different ReconMethods • Active Scan • Passive Scan • Screenshot Scan • DB Support BlackHat Arsenal USA – 2014
Fener – Active Scan • LeveragesNmapforactive port scanning • Customconfig file forscanparameters • Ports • NSE Scripts • Savescanresultswithstandardreport name • MultipleNmapscans • PingScan • Service & OS Scan • ScriptScan BlackHat Arsenal USA – 2014
Fener – PassiveScan • Stealth network recon • Passivetrafficcapture • ArpspoofMitMsupport • Trafficsaved in pcap file • Valuableinformationextractedfromtraffic • Hosts • Ports • Windows hostnames • Top 10 HTTP hosts • Top 10 DNS domains BlackHat Arsenal USA – 2014
Fener – PassiveScan • Man In The Middle • Network traffic capture BlackHat Arsenal USA – 2014
Fener – ScreenshotScan • PhantomJSheadlesswebkit • Web pagediscovery • Screnshotsfromcommandline • Standard screenshotfilenames • Offline examination • Pentestreport BlackHat Arsenal USA – 2014
Crowbar • Brute Force Tool • https://github.com/galkan/levye • Supported protocols • OpenVPN • Remote Desktop Protocol (with NLA support) • SSH Private Key • VNC Passwd • Reporting • Debug Logging BlackHat Arsenal USA – 2014
SeeS • Social Engineering Tool • https://github.com/heybe/sees • Send targeted SE mails in bulk • HTML mail body • Multiple attachment • Local/Remote SMTP server BlackHat Arsenal USA – 2014
DepDep • Post-Exploitation Tool • https://github.com/heybe/depdep • Discover sensitive files in network shares • Works with Windows SMB shares • Can search sensitive information within file name and file contents BlackHat Arsenal USA – 2014
Kacak • Active Directory Attack Tool • https://github.com/heybe/kacak • Leverages Metasploit & Mimikatz • Huntfor domain admins in WindowsAD Domain • MetasploitautomationwithMSFRPCD BlackHat Arsenal USA – 2014
Summary BlackHat Arsenal USA – 2014
HEYBE • BahtiyarBircan (bahtiyarb@gmail.com), Gökhan ALKAN (cigalkan@gmail.com) • https://github.com/heybe • https://github.com/galkan/sees • https://github.com/galkan/depdep • https://github.com/galkan/sees • https://github.com/galkan/kacak • https://github.com/galkan/fener • https://github.com/galkan/crowbar BlackHat Arsenal USA – 2014