hatRiot/clusterd

Auxiliary List out upon Fingerprint

Closed this issue · 2 comments

Would be cool to see Clusterd print applicable auxiliary modules after fingerprinting a server, based upon said server's version. That is, something like:

[2014-07-23 02:49PM] Started at 2014-07-23 02:49PM
[2014-07-23 02:49PM] Servers' OS hinted at windows
[2014-07-23 02:49PM] Fingerprinting host '[ip]'
[2014-07-23 02:49PM] Server hinted at 'tomcat'
[2014-07-23 02:49PM] Checking tomcat version 3.3 Tomcat...
[2014-07-23 02:49PM] Checking tomcat version 3.3 Tomcat Admin...
[2014-07-23 02:49PM] Checking tomcat version 4.0 Tomcat...
[2014-07-23 02:49PM] Checking tomcat version 4.1 Tomcat...
[2014-07-23 02:49PM] Checking tomcat version 4.1 Tomcat Manager...
[2014-07-23 02:49PM] Checking tomcat version 4.0 Tomcat Manager...
[2014-07-23 02:49PM] Checking tomcat version 5.0 Tomcat...
[2014-07-23 02:49PM] Checking tomcat version 5.5 Tomcat...
[2014-07-23 02:49PM] Checking tomcat version 5.5 Tomcat Manager...
[2014-07-23 02:49PM] Checking tomcat version 5.0 Tomcat Manager...
[2014-07-23 02:49PM] Checking tomcat version 6.0 Tomcat...
[2014-07-23 02:49PM] Checking tomcat version 6.0 Tomcat Manager...
[2014-07-23 02:49PM] Checking tomcat version 7.0 Tomcat...
[2014-07-23 02:49PM] Checking tomcat version 7.0 Tomcat Manager...
[2014-07-23 02:49PM] Checking tomcat version 8.0 Tomcat...
[2014-07-23 02:49PM] Checking tomcat version 8.0 Tomcat Manager...
[2014-07-23 02:49PM] Matched 1 fingerprints for service tomcat
[2014-07-23 02:49PM] Tomcat (version 5.0)
[2014-07-23 02:49PM] Available Modules:
[2014-07-23 02:49PM] X...
[2014-07-23 02:49PM] Y...
[2014-07-23 02:49PM] Z...
[2014-07-23 02:49PM] Fingerprinting completed.
[2014-07-23 02:49PM] Finished at 2014-07-23 02:49PM

Tagged; I'll look into this.

Thanks!

You know, looking at this feature request again, this is already built into clusterd! The --fingerprint flag does just this.

bryan@debdev:~/tools/clusterd$ ./clusterd.py -i 192.168.1.138 -a tomcat --fingerprint

        clusterd/0.4 - clustered attack toolkit
            [Supporting 7 platforms]

[2015-01-17 02:57PM] Started at 2015-01-17 02:57PM
[2015-01-17 02:57PM] Servers' OS hinted at windows
[2015-01-17 02:57PM] Fingerprinting host '192.168.1.138'
[2015-01-17 02:57PM] Server hinted at 'tomcat'
[2015-01-17 02:57PM] Checking tomcat version 3.3 Tomcat...
[2015-01-17 02:57PM] Checking tomcat version 3.3 Tomcat Admin...
[2015-01-17 02:57PM] Checking tomcat version 4.0 Tomcat...
[2015-01-17 02:57PM] Checking tomcat version 4.1 Tomcat...
[2015-01-17 02:57PM] Checking tomcat version 4.1 Tomcat Manager...
[2015-01-17 02:57PM] Checking tomcat version 4.0 Tomcat Manager...
[2015-01-17 02:57PM] Checking tomcat version 5.0 Tomcat...
[2015-01-17 02:57PM] Checking tomcat version 5.5 Tomcat...
[2015-01-17 02:57PM] Checking tomcat version 5.5 Tomcat Manager...
[2015-01-17 02:57PM] Checking tomcat version 5.0 Tomcat Manager...
[2015-01-17 02:57PM] Checking tomcat version 6.0 Tomcat...
[2015-01-17 02:57PM] Checking tomcat version 6.0 Tomcat Manager...
[2015-01-17 02:57PM] Checking tomcat version 7.0 Tomcat...
[2015-01-17 02:57PM] Checking tomcat version 7.0 Tomcat Manager...
[2015-01-17 02:57PM] Checking tomcat version 8.0 Tomcat...
[2015-01-17 02:57PM] Checking tomcat version 8.0 Tomcat Manager...
[2015-01-17 02:57PM] Matched 2 fingerprints for service tomcat
[2015-01-17 02:57PM]    Tomcat (version 5.5)
[2015-01-17 02:57PM]    Tomcat Manager (version 5.5)
[2015-01-17 02:57PM] Fingerprinting completed.
[2015-01-17 02:57PM]   Gather Tomcat info (--tc-info)
[2015-01-17 02:57PM]   List deployed WARs (--tc-list)
[2015-01-17 02:57PM]   Obtain SMB hash (--tc-smb)
[2015-01-17 02:57PM] Finished at 2015-01-17 02:57PM