hacking tools using basic linux command and bash shell scripting instead of complex frameworks
- Introduction
- fuzzing tools
- ip sweep
- port scanning
- Rest api calls
- Cracking hash
- port forwarding
- banner-grabbing
- proxy
- tracking-open-files
- logger
- https dump
- postgresql bruteforce
- Donation
Since most commons frameworks are easily detectable by siem investigation, the goal of this repository is to implement hacking techniques using basic linux command tools like: netcat, curl, ping.
Is it possible with curl to create a simple web fuzzer. Here the bash scripts:
- hostfuzzing
- subdomainfuzzing
- virtualhostfuzzing
For these scripts pass:
- as first argument the host
- as second argument the fuzz file
Example:
bash hostfuzzing.sh google.it seclists/Discovery/Web-Content/directory-list-2.3-small.txt
Is it possible to enumerate a LAN network by simply using the ip utils. The bash script that does this functionality is *pingsweep.sh. Example usage:
bash pingsweep.sh 192.168.40
With netcat is it possible to create a simple port scanning. The bash scripting strategy uses two solutions:
- A full port scanning => it iterates until the last port passed
- A selected port range => it iterates in a text file selected ports
In the first solution the bash script is the following:
bash portscanning.sh 127.0.0.1 80
For the second solution the bash script is the following:
bash portspecificscanning.sh 127.0.0.1 ports.txt
With curl is possible to do rest api calls, the bash script here do a get call and a json request rest api call:
- get.sh
- jsonpost.sh
For get.sh it's enough to pass only as paramter the URL without http or https:
bash get.sh google.it/images
For jsonpost.sh for first parameter it's mandatory the host, and as the second paramter the json body:
bash jsonpost.sh myvulnsite.com {"value":1}
The following bash scripts crack the following hash algorithm using dictionary attack:
- md5cracker.sh => cracks md5 hashes
- sha1cracker.sh => cracks sha1 hashes
- sha256cracker.sh => cracks sha256 hashes
For each of these bash scripts pass as first argument the hash and as second argument the dictionary file:
bash md5cracker.sh b1946ac92492d2347c6235b4d2611184 dictionary.txt
To forward the traffic to a port for a specific service you need to launch portforwarding.sh as the following:
bash portforwarding.sh YOUR_LOCAL_PORT SERVICE_IP SERVICE_PORT
where:
- YOUR_LOCAL_PORT = the port where you want to forward traffic
- SERVICE_IP = the ip of your service
- SERVICE_PORT = the port of your service
Just insert the host where you want to grab the banner
bash bannergrabbing.sh
Just insert the port where the proxy has to listen:
bash proxy.sh 1234
It tracks the file opened by a specific application. If you don't want to save the logs to a file just run:
bash tracking-open-file-program.sh /bin/application
if you want to save the logs to a file just add as second paramter the path where you want to save the dump:
bash tracking-open-file-program.sh /bin/application /home/user/dump/dump.txt
Logs the content of a specific file by listening on a specific port:
bash logger.sh /var/log/nginx/access.log 1234
Dumps https traffic on client side:
bash httpsdump.sh /home/myuser wlan0
Run the pgsql-brute.sh script passing the following arguments:
- user
- host
- dictionary file
If the password is found the script will print the following output:
PASSWORD FOUND: [ mypassword ]
Where the password is in the square brackets
I hope you found this experiment interesting. I love creating open-source projects and sharing knowledge with the community. If you’d like to support my future work, you can do so in a couple of ways:
- 💰 Donate Monero (XMR):
4B9WQivaHfd3miDfPKEfCianocGpBx9d8FXycz2vmNW3aBDVKHgkBd9Gmapt4RBVEpTwnehujsiUBBehUiLvnEHs7VFstCC - 💵 Donate via PayPal: https://www.paypal.me/francescodisales
Every donation helps me continue building tools, research, and experiments for the benefit of the community. Thank you for your support!
