Legion – An Easy-To-Use, Super-Extensible And Semi-Automated Network Penetration Testing Tool That Aids In Discovery, Reconnaissance And Exploitation Of Information Systems

Legion, a fork of SECFORCE’s Sparta, is an open source, easy-to-use, super-extensible and semi-automated network penetration testing framework that aids in discovery, reconnaissance and exploitation of information systems. Legion is developed and maintained by GoVanguard. More information about Legion, including the product roadmap, can be found on it’s product page at https://GoVanguard.io/legion.FEATURESAutomatic recon and scanning with NMAP, whataweb, nikto, Vulners, Hydra, SMBenum, dirbuster, sslyzer, webslayer and more (with almost 100 auto-scheduled scripts)Easy to use graphical interface with rich context menus and panels that allow pentesters to quickly find and exploit attack vectors on hostsModular functionality allows users to easily customize Legion and automatically call their own scripts/toolsHighly customizable stage scanning for ninja-like IPS evasionAutomatic detection of CPEs (Common Platform Enumeration) and CVEs (Common Vulnerabilities and Exposures)Realtime autosaving of project results and tasksNOTABLE CHANGES FROM SPARTARefactored from Python 2.7 to Python 3.6 and the elimination of depreciated and unmaintained librariesUpgraded to PyQT5, increased responsiveness, less buggy, more intuitive GUI that includes features like:Task completion estimates1-Click scan lists of ips, hostnames and CIDR subnetsAbility to purge results, rescan hosts and delete hostsGranual NMAP scanning optionsSupport for hostname resolution and scanning of vhosts/sni hostsRevise process queuing and execution routines for increased app reliability and performanceSimplification of installation with dependency resolution and installation routinesRealtime project autosaving so in the event some goes wrong, you will not loose any progress!Docker container deployment optionSupported by a highly active development teamGIF DEMOINSTALLATIONTRADITIONAL METHODAssumes Ubuntu, Kali or Parrot Linux is being used with Python 3.6 installed. Other dependencies should automatically be installed. Within Terminal:git clone https://github.com/GoVanguard/legion.gitcd legionsudo chmod +x startLegion.shsudo ./startLegion.shDOCKER METHODAssumes Docker and Xauthority are installed. Within Terminal:git clone https://github.com/GoVanguard/legion.gitcd legion/dockersudo chmod +x runIt.shsudo ./runIt.shATTRIBUTIONRefactored Python 3.6+ codebase, added feature set and ongoing development of Legion is credited to GoVanguardThe initial Sparta Python 2.7 codebase and application design is credited SECFORCE.Several additional PortActions, PortTerminalActions and SchedulerSettings are credited to batmancrew.The nmap XML output parsing engine was largely based on code by yunshu, modified by ketchup and modified SECFORCE.ms08-067_check script used by smbenum.sh is credited to Bernardo Damele A.G.Legion relies heavily on nmap, hydra, python, PyQt, SQLAlchemy and many other tools and technologies so we would like to thank all of the people involved in the creation of those.Download Legion

Link: http://feedproxy.google.com/~r/PentestTools/~3/jDSvXwEafjY/legion-easy-to-use-super-extensible-and.html

Windows Persistence with PowerShell Empire

This is the third article in our empire series, through this we will learn elevated persistence methods. Its trigger method is pretty organised with storage options contained within each module. In Empire, the elevated persistence modules use trigger method and different storage options are required in different modules.  All of these persistence modules are based… Continue reading →
The post Windows Persistence with PowerShell Empire appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/windows-persistence-with-powershell-empire/

Post Exploitation on Saved Password with LaZagne

This article will be focused on The LaZagne project and its usage in Post Exploitation. Table of Content: Introduction of LaZagne Project Syntax and Parameters Achieve Meterpreter and Upload LaZagne Help Screen Mails Argument Windows Argument Browsers Argument Databases Argument Wi-Fi Argument All Argument oN Parameter Verbose Mode Parameter Quiet Parameter Introduction of LaZagne Project… Continue reading →
The post Post Exploitation on Saved Password with LaZagne appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/post-exploitation-on-saved-password-with-lazagne/

UPDATE: Kali Linux 2019.1 Release!

PenTestIT RSS Feed
Kali Linux 2019.1 is the latest Kali Linux release. This is the first 2019 release, which comes after Kali Linux 2018.4, that was made available in the month of October. This new release includes all patches, fixes, updates, and improvements since the last release – Kali Linux 2018.3, including a shiny new Linux kernel versionRead more about UPDATE: Kali Linux 2019.1 Release!
The post UPDATE: Kali Linux 2019.1 Release! appeared first on PenTestIT.

Link: http://pentestit.com/update-kali-linux-2019-1-release/

Comprehensive Guide on Snort (Part 1)

This article will introduce a guide to understand IDS using Snort as an example for it. Table of Content : Introduction to IDS Categories of IDS Types of IDS Introduction to Snort Introduction to IDS IDS Stands for Intrusion Detection System. The techniques and methods on which an IDS is founded on are used to… Continue reading →
The post Comprehensive Guide on Snort (Part 1) appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/comprehensive-guide-on-snort-part-1/

Penetration Testing on Memcached Server

In our previous article, we learned how to configure Memcached Server in Ubuntu 18.04 system to design our own pentest lab. Today we will learn multiple ways to exploit Memcached Server. Table of Contents Dumping data from the Memcached server manually. Dumping data using libmemcached-tools. Dumping data using Metasploit. Monitoring using Watchers. Requirements Target: Memcached… Continue reading →
The post Penetration Testing on Memcached Server appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/penetration-testing-on-memcached-server/

BeEF – The Browser Exploitation Framework Project

What is BeEF?BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.Amid growing concerns about web-borne attacks against clients, including mobile clients, BeEF allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors. Unlike other security frameworks, BeEF looks past the hardened network perimeter and client system, and examines exploitability within the context of the one open door: the web browser. BeEF will hook one or more web browsers and use them as beachheads for launching directed command modules and further attacks against the system from within the browser context.Get InvolvedYou can get in touch with the BeEF team. Just check out the following:Please, send us pull requests!Web: https://beefproject.com/Bugs: https://github.com/beefproject/beef/issuesSecurity Bugs: security@beefproject.comIRC: ircs://irc.freenode.net/beefprojectTwitter: @beefprojectRequirementsOperating System: Mac OSX 10.5.0 or higher / modern LinuxRuby: 2.3 or newerSQLite: 3.xNode.js: 6 or newerThe gems listed in the Gemfile: https://github.com/beefproject/beef/blob/master/Gemfilebrew install selenium-server-standalone (See https://github.com/shvets/selenium)Quick StartThe following is for the impatient.The install script installs the required operating system packages and all the prerequisite Ruby gems:$ ./installFor full installation details, please refer to INSTALL.txt.We also have an Installation page on the wiki.Upon successful installation, be sure to read the Configuration page on the wiki for important details on configuring and securing BeEF.UsageTo get started, simply execute beef and follow the instructions: $ ./beefVideoDownload Beef

Link: http://feedproxy.google.com/~r/PentestTools/~3/W1UXPoIIVbg/beef-browser-exploitation-framework.html

Windows Firewall Post Exploitation with Netsh

This article is will provide an in-depth post exploitation guide to gather all the information about the victim’s Firewall and network settings. Table of Content : Introduction to Firewall Rules of Firewall Advantages of Firewall Types of Firewall Importance of firewall Introduction to netsh How to block a TCP Port on remote PC How to… Continue reading →
The post Windows Firewall Post Exploitation with Netsh appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/windows-firewall-post-exploitation-with-netsh/

TrevorC2 – Command and Control

TrevorC2 is command and control framework. It is a client/server model which works through a browser masquerading as C2 tool. It works on different time intervals which makes it almost impossible to be detected. This tool is coded in python but it’s also compatible with c#, PowerShell, or any other platform. this is supported by… Continue reading →
The post TrevorC2 – Command and Control appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/trevorc2-command-and-control/

Bypass Application Whitelisting using cmstp

By default, Applocker allows the executing of binaries in the folder that is the major reason that it can be bypassed. It has been found that such binaries can easily be used in order to bypass Applocker along with UAC. One of such binary related to Microsoft is CMSTP. CMSTP welcomes INF files and so… Continue reading →
The post Bypass Application Whitelisting using cmstp appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/bypass-application-whitelisting-using-cmstp/