eddiegulay / octo-carnival

Lab Test 1

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

FTP Exploit Automation Scripts

  1. ftp_exploit_v1_[auto_anonymous_login].sh: This script tries to exploit an FTP server with anonymous login enabled. It automatically logs into the FTP server and uploads a file.

    ./ftp_exploit_v1_[auto_anonymous_login].sh domain_name.com
  2. ftp_exploit_v2_[attempt_to_read_writeable_directories].sh: This script tries to exploit an FTP server with anonymous login enabled. It automatically logs into the FTP server and checks for writable directories.

    ./ftp_exploit_v2_[attempt_to_read_writeable_directories].sh domain_name.com
  3. ftp_exploit_v3_[succesfull_upload_file_to_writeable_dir].sh: This script tries to exploit an FTP server with anonymous login enabled. It automatically logs into the FTP server, checks for writable directories, and injects a file into the first writable directory found.

    ./ftp_exploit_v3_[succesfull_upload_file_to_writeable_dir].sh domain_name.com
  4. ftp_exploit_v4_[injects_file_to_all_writable_directories].sh: This script is not provided in the workspace, so I can't provide a description for it.

  5. ftp_exploit_v5_[tries_to_download_all_readable_files].sh: This script tries to exploit an FTP server with anonymous login enabled. It automatically logs into the FTP server, checks for readable directories, and downloads all readable files.

    ./ftp_exploit_v5_[tries_to_download_all_readable_files].sh domain_name.com

FTP Vulnerability Check Scripts

  1. ftp_vuln_check_v1.sh: This script is not provided in the workspace, so I can't provide a description for it.

  2. ftp_vuln_check_v2.sh: This script is not provided in the workspace, so I can't provide a description for it.

  3. ftp_vuln_check_v3_[Perform_general_ftp_enumeration].sh: This script is not provided in the workspace, so I can't provide a description for it.

  4. ftp_vuln_check.sh: This script is not provided in the workspace, so I can't provide a description for it.

Domain Discovery Scripts

domain_discovery/crawler.py:
This script is a simple web crawler that fetches and parses links from a given URL. It uses the requests library to send HTTP requests and BeautifulSoup to parse the HTML response. The script reads a list of seed domains from a file, fetches links from each domain, cleans and validates the links, and then checks if the domain of each link is not already in the discovered domains set. If it's not, it adds the domain to the set and prints it. The script then writes the discovered domains to an output file.

Domain Discovery Scripts Documentation

crawler.py

Description:
This script is a simple web crawler that fetches and parses links from a given URL. It uses the requests library to send HTTP requests and BeautifulSoup to parse the HTML response.

How to Run:

python crawler.py

Key Functions

  • get_domain(url): Extracts the domain from a URL.

  • fetch_links(url): Sends a GET request to a URL and parses the response to extract all links.

  • clean_links(links, base_url): Cleans and validates a list of links.

  • crawl_domains(seed_domains, output_file): Crawls a list of seed domains and writes the discovered domains to an output file.

conditional_crawler.py

Description:
This script is similar to crawler.py, but it uses multithreading to crawl multiple domains concurrently. It also includes a function to check if a domain belongs to Tanzania by checking its top-level domain (TLD) against a list of valid Tanzanian TLDs.

How to Run:

python conditional_crawler.py

Key Functions

  • get_domain(url): Extracts the domain from a URL.

  • fetch_links(url): Sends a GET request to a URL and parses the response to extract all links.

  • clean_links(links, base_url): Cleans and validates a list of links.

  • is_tanzanian_domain(domain): Checks if a domain belongs to Tanzania.

  • crawl_single_domain(seed, discovered_domains, lock): Crawls a single domain and adds discovered domains to a set using multithreading.

  • crawl_domains(seed_domains, output_file): Crawls a list of seed domains using multithreading and writes the discovered domains to an output file.

Certainly! Here's a refined documentation for the /password_bypass directory:


/password_bypass Directory

The /password_bypass directory contains scripts and resources designed for bypassing password protection on FTP servers.

Files:

  1. sites.txt:

    • Description: Contains a list of domain names to be tested for password bypass.
    • Format: Each line represents a different domain.
  2. passwords.txt:

    • Description: Contains a list of potential passwords to be used in the password bypass attempts.
    • Format: Each line represents a different password.
  3. login_results.txt:

    • Description: Logs the results of the password bypass attempts.
    • Format: Each entry includes:
      • Domain name
      • Login status (whether the domain was protected or allowed anonymous login)
      • Results of the Hydra tool if used

Scripts:

  1. ftp_login_checker.sh:
    • Description: Automates the process of testing FTP servers for vulnerabilities.
    • Usage: Utilizes domains listed in sites.txt and passwords in passwords.txt.
    • Functionality:
      • Attempts to login anonymously to each domain.
      • If anonymous login fails, uses Hydra tool to attempt login with potential passwords.
      • Logs results in login_results.txt.

to run the script, use the following command:

./ftp_login_checker.sh domain_name.com

About

Lab Test 1


Languages

Language:Shell 79.5%Language:Python 20.5%