PACEJJ27 / Albert

The Albert, the smart recon tool.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

F.A.T Albert

The Albert


Synopsis:

The smart penetration testing tool. This tool is meant as an all in one for penetration testing, mixing some tried and tested methods for gathering recon on a single machine or an entire subnet.

With output being printed into Nmap XML document for easy use with ExploitDB. The scans used within this tool will be incredibly verbose and make its best attempt at service identification, although it uses subprocess to leverage the strength and power of Nmap, it still combines the extra steps into a single tool. This fixes 2 issues, the first being having to manually run all XML output(stored in this directory XML_Output) through ExploitDB to find the most likely exploits to use against your clients machine, AND simplifies the recon process. The best part of this tool, is it uses both active scanning or passive scanning, the choice is at your fingertips, it leverages the power of Shodan with all results written to a single file(overwritten each run) for later review, the full logging of the shodan results can be found inside the atk_output folder, matter of a fact, ALL output from each scan can be found inside the atk_output folder atk_output.

This tool will also make an attempt to retrieve the Geo Location data for a specified IP address. And to top it all off, this program will attempt to enumerate SMTP username's and password's, leveraging the power of SecLists. Or your own custom password/user name lists, this project is designed to grow and be fully extensible.

This application in future versions will no longer support SQLite.

All username/password lists are stored here: data. The functions that leverage the wordlists within this directory are:

On top of all those cool features, this project will enumerate a subnet for hosts connected to the subnet, by 1 of 2 ways. An ARP scan of the entire subnet, You will need to choose an interface for this, or ICMP ACK scans(still being developed), if the target allows such scans from outside the network to occur. Found hosts can be used for a zombie scan, or for later implimentations push directly into network pivoting, the choice is yours.


Install:

sudo apt install python3-setuptools python3-minimal python3-pip python-dev python3-dev python3-scapy python3-tqdm python3-termcolor python3-shodan nmap exploitdb

OR:

sudo apt install nmap exploitdb python3-setuptools python3-minimal python3-pip python-dev python3-dev

sudo pip3 install -r requirements

Upon successful installation of the required packages, you will NEED to acquire an API key to use VulnersDB from: https://www.vulners.com

To utilize the persistent python scripts within this module, you will need to install Pypiwin32.


Usage:

The useage of this tool is very easy, there is a guided menu. The options are seperated by type, future editions of this tool will incoporate exploitation and post-exploitation phases to further simplify the whole process. Along with the additions of those 2 phases, it will also have the ability to automate the whole process, and not just shotgun blast exploits at a clients machine in the hope that one will work. cough Autosploit.

Because of the lower level packages within this project, you will need to run this program as sudo:

Clone the repo by using the standard git clone method:

git clone https://github.com/oldkingcone/Albert.git ; cd Albert-master

To run the program, simply use:

sudo python3 ./Albert.py


Bugs:

Please note, that currently there is a bug in the automated portion of this script that does not log properly. We are still working the kinks out on that portion and will have a working fully automated, logging capable, version soon.


Future Features:

  1. Automation of Recon Phase
    1. Add Option to choose automated recon phase with little printed out to the screen, other than the reccommended exploits, suggested by ExploitDB.
    2. Make this into an API so it can be imported into other projects.
  2. A routine that, based off of information collected from the targeted system, populates the correct information within exploit
    1. Correct hostname paramaters, named pipes, or other collected information.
    2. Routine to handle Exploitation process either manual or guided.
  3. SQL Injection testing.
    1. By either adding SQLMap directly to the project, or other means.
  4. SQL Database logging of discovered weaknesses/information.
  5. Automatic cloaking(through TOR)
    1. Use Stem package for this.
  6. Network Pivoting
    1. Add a way to pivot yourself through the network exploring all available options.
  7. Bring in AI( oh yea ):
    1. Teach the AI to recognize honeypots and docker containers, and to avoid them at all costs.
    2. Also teach the AI to help with fuzzing to bypass WAF/IDS.
  8. DPKT for network level attacks such as, DNS Poisoning, ARP Poisoning, etc.
  9. Persistent:
    1. Adding modules to be dropped onto a target system, for extended control through the penetration test, by modifying the registry, getting important OS info, and adding a special tunnel for our traffic to flow through while in the network.
  10. ICS/SCADA:
    1. Incorporate ICS/Scada testing and scanning.

Thanks:

If you enjoy this tool, say thank you to the crew of Freedom45, or, Chef, Root, and Johnny5.


Addendum:

Do not be an idiot, do not do anything illegal with this tool. This tool has been made for professionals or for educational purposes to use in LEGAL penetration testing sessions. If you choose to use this tool, and get into trouble with it, THE CREATORS OF THIS TOOL ARE NOT RESPONSIBLE FOR YOUR DECISIONS, know the laws, and do not break them.

About

The Albert, the smart recon tool.


Languages

Language:PowerShell 74.4%Language:JavaScript 10.5%Language:Python 6.0%Language:C 3.7%Language:Go 2.7%Language:C# 1.0%Language:HTML 0.7%Language:C++ 0.5%Language:CSS 0.2%Language:Shell 0.2%Language:Batchfile 0.0%Language:Makefile 0.0%Language:Smarty 0.0%Language:Dockerfile 0.0%Language:Perl 0.0%Language:TSQL 0.0%