mirror of
https://github.com/autistic-symposium/sec-pentesting-toolkit.git
synced 2025-05-06 08:45:22 -04:00
add the stuff floating from other machines
This commit is contained in:
parent
30e65244e2
commit
35788d79e2
252 changed files with 12374 additions and 603 deletions
|
@ -498,7 +498,7 @@ Cool, huh?
|
|||
|
||||
## A TCP Proxy
|
||||
|
||||
A TCP proxy can be very useful for forwarding traffic and when assessing network-based softwares (for example, when you cannot run [Wireshark](http://bt3gl.github.io/wiresharking-for-fun-or-profit.html) or you cannot load drivers or tools in the machine you are exploiting).
|
||||
A TCP proxy can be very useful for forwarding traffic and when assessing network-based softwares (for example, when you cannot run [Wireshark](http://https://singularity-sh.vercel.app/wiresharking-for-fun-or-profit.html) or you cannot load drivers or tools in the machine you are exploiting).
|
||||
|
||||
To create a proxy we need to verify if we need to *first initiate a connection* to the remote side. This will request data before going into our main loop and some server daemons expect you to do this first (for instance, FTP servers send a banner first). We call this information **receive_first**.
|
||||
|
||||
|
@ -730,7 +730,7 @@ Additionally, let's take a quick look to all the methods available with the **s
|
|||
|
||||
- [Python's Socket Documentation](https://docs.python.org/2/library/socket.html)
|
||||
- [Black Hat Python](http://www.nostarch.com/blackhatpython).
|
||||
- [My Gray hat repo](https://github.com/bt3gl/My-Gray-Hacker-Resources).
|
||||
- [My Gray hat repo](https://github.com/go-outside-labs/My-Gray-Hacker-Resources).
|
||||
- [A TCP Packet Injection tool](https://github.com/OffensivePython/Pinject/blob/master/pinject.py).
|
||||
- [An asynchronous HTTP Proxy](https://github.com/OffensivePython/PyProxy/blob/master/PyProxy.py).
|
||||
- [A network sniffer at the Network Layer](https://github.com/OffensivePython/Sniffy/blob/master/Sniffy.py).
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
__author__ = "bt3"
|
||||
__author__ = "Mia Stein"
|
||||
|
||||
|
||||
import socket
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
__author__ = "bt3"
|
||||
__author__ = "Mia Stein"
|
||||
|
||||
|
||||
import socket
|
||||
|
@ -204,4 +204,4 @@ def main():
|
|||
|
||||
|
||||
if __name__ == '__main__':
|
||||
main()
|
||||
main()
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
__author__ = "bt3"
|
||||
__author__ = "Mia Stein"
|
||||
|
||||
|
||||
import socket
|
||||
|
@ -33,4 +33,4 @@ if __name__ == '__main__':
|
|||
|
||||
text_to_send = ''
|
||||
text_recved = netcat(text_to_send))
|
||||
print text_recved[1]
|
||||
print text_recved[1]
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
__author__ = "bt3"
|
||||
__author__ = "Mia Stein"
|
||||
|
||||
|
||||
import socket
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
__author__ = "bt3"
|
||||
__author__ = "Mia Stein"
|
||||
|
||||
|
||||
import socket
|
||||
|
@ -154,4 +154,4 @@ def main():
|
|||
server_loop(local_host, local_port, remote_host, remote_port, receive_first)
|
||||
|
||||
if __name__ == '__main__':
|
||||
main()
|
||||
main()
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
__author__ = "bt3"
|
||||
__author__ = "Mia Stein"
|
||||
|
||||
|
||||
import socket
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
__author__ = "bt3"
|
||||
__author__ = "Mia Stein"
|
||||
|
||||
|
||||
import socket
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
__author__ = "bt3"
|
||||
__author__ = "Mia Stein"
|
||||
|
||||
import socket
|
||||
|
||||
|
@ -19,4 +19,4 @@ def udp_server():
|
|||
print data
|
||||
|
||||
if __name__ == '__main__':
|
||||
udp_server()
|
||||
udp_server()
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue