/warberry

WarBerryPi - Tactical Exploitation

Primary LanguagePython

WarBerryPi

alt tag

GPLv3 License Python 2.6|2.7 Twitter

The WarBerry was built with one goal in mind; to be used in red teaming engagement where we want to obtain as much information as possible in a short period of time with being as stealth as possible. Just find a network port and plug it in. The scripts have been designed in a way that the approach is targeted to avoid noise in the network that could lead to detection and to be as efficient as possible. The WarBerry script is a collection of scanning tools put together to provide that functionality.

####Usage

To get a list of all options and switches use:

sudo python warberry.py -h

Parameters:
-h,  --help         [*] Print this help banner
-m,  --man          [*] Prints WarBerry's Man Page
-A,  --attack       [*] Run All Enumeration Scripts
-S,  --sniffer      [*] Run Sniffing Modules Only
-C,  --clear        [*] Clear Output Directories
-F,  --fulltcp      [*] Full TCP Port Scan
-T,  --toptcp       [*] Top Port Scan
-U,  --topudp       [*] Top UDP Port Scan

example usage: sudo python warberry.py -A
               sudo python warberry.py --attack
               sudo python warberry.py -C

Installation

Optional: Change the hostname of the RaspberryPi to WarBerry

sudo nano /etc/hosts

sudo nano /etc/hostname

Reboot the WarBerry for the changes to take effect

Optional: Create a directory under /home/pi

sudo mkdir WarBerry

Create the Results subdirectory in /WarBerry

sudo mkdir Results

Download WarBerry by cloning the Git repository:

sudo git clone https://github.com/secgroundzero/warberry.git

Important

The tool in case of MAC address filtering enumerates by default the subnets specified under /home/pi/WarBerry/warberry/discover. This is done for the tool to run quicker. If you want to enumerate more subnets either add the subnets in that file or change line 154 in rest_bypass.py so that it does not read from the file.

Running Status

If you are connecting through SSH you can check the status of the attacks by checking the results_status file under Results. The file gets updated after each phase is completed.

Dependencies

  • sudo apt-get install nbtscan
  • sudo apt-get install python-scapy
  • sudo apt-get install tcpdump
  • sudo apt-get install nmap
  • sudo pip install python-nmap
  • sudo pip install ipaddress
  • sudo apt-get install ppp
  • sudo apt-get install sg3-utils
  • sudo apt-get install netdiscover
  • sudo apt-get install macchanger
  • sudo git clone https://github.com/DanMcInerney/net-creds.git #install in /home/pi/WarBerry/Tools/

Extra Tools for Post Exploitation. Best to install in /home/pi/WarBerry/Tools/ directory

Aircrack Installation