Linux-Evil-Toolkit – A Framework That Aims To Centralize, Standardize And Simplify The Use Of Various Security Tools For Pentest Professionals

Linux-Evil-Toolkit - A Framework That Aims To Centralize, Standardize And Simplify The Use Of Various Security Tools For Pentest Professionals

Linux evil toolkit is a framework that aims to centralize, standardize 
and simplify the use of different protection applications for pentest specialists.
LETK (Linux evil toolkit) has few straightforward instructions, just one of which is the
INIT that makes it possible for you to outline a concentrate on, and hence use all the tools
devoid of typing everything else.

Is LETK better than setoolkit? Sure and no, there are two that provide the
same detail and in a unique way, the Linux Evil Toolkit and an
automated assault data automation script.

concerns

ยง 1 About use

This script was designed to automate the methods of gathering information and facts about net
targets, the misuse and obligation of the user, to report bugs or make
ideas open up a report on github.

ยง 2 About very simple_scan

Automap was changed by uncomplicated_scan, it is lighter and more rapidly, in addition to being
much less detectable, now it has various modes of execution that make it achievable from
a speedy and simple execution to extra sophisticated modes.

ยง 3 About Console

The output of the script can be very extensive, so see if your console,
(gnome-terminal, cmd, konsole) is configured to show 1000 strains
(I especially advise 10,000 lines), for professional functions it makes it possible for
the documentation, it data the commands, exits and formats th e text.

Usage

Notice: When you start out a pentest, kind the INIT command and outline the target, or compose values in linux-evil-toolkit/config/letk.rb

Basics

|exit           |   Close this script                                           
|obvious | Distinct terminal
|update | Update Linux evil toolkit
|prepare | Demonstrate practice in terminal, tuutuu
|INIT | Setup worldwide variables
|reset | Distinct terminal and reset global variables
|protect | Go over your tracks on your computer
|basic_map | This command execute automap (car namap)
|research | Search e mail, whois and banner grep
|standing | Exhibit device status
|dnsscanner | Scan for 'A', 'AAAA', 'CNAME', 'MX', 'NS', 'PTR', 'SOA'
|dirscanner | Scan documents and folders
|banner | Display Linux evil Toolkit banner in terminal
|webdns | Exhibit Web Web sites for dns scanner
|linuxfiles | Show essential linux files
|linuxfolders | Demonstrate significant linux folders
|windowsfolders | Display significant home windows folders
|linuxutil | Show beneficial commands in linux
|take a look at | For progress only

uncomplicated_scan alternatives

on your own

"-sL" --> "Record Scan - merely list targets to scan"
"-sP" --> "Ping Scan - go no further than pinpointing if host is on-line"

default

"-sS -sV" --> "TCP SYN"
"-sU -sV" --> "UDP Scan"

icmp_echo

"-sS -sV -PE" --> "TCP SYN + ICMP echo discovery probes"
"-sU -sV -PE" --> "UDP Scan + ICMP echo discovery probes"
"-sA -sV -PE" --> "ACK + ICMP echo discovery probes"

port_checklist

"-sS" --> "TCP SYN + [portlist]: TCP SYN discovery probes to provided ports"
"-sA" --> "ACK + [portlist]: TCP ACK discovery probes to given ports"
"-sU" --> "UDP Scan + [portlist]: TCP UDP discovery probes to presented ports"

exclusive

"-sT -sV" --> "Hook up()"
"-sW -sV" --> "Window"
"-sM -sV" --> "Maimon scans"
"-sN -sV" --> "TCP Null"
"-sF -sV" --> "FIN"
"-sX -sV" --> "Xmas scans"

DeepLink

DeepLink is a deepweb (tor onion domain) database for your take a look at and discover "deep web" for enjoyable

usage: sort deeplink and variety solution
--web site | Cat ideal website for your find out about deepweb
--darklinks | exhibit darkish-net inbound links
--onionlinks | clearly show more 500 deep website inbound links
--onionlinks-energetic | show extra hyperlinks, but active one-way links only
--searchlinks | demonstrate tor search (google-like)
--toralt | demonstrate tor alternate options (i2-, freenet, and so on)

Backend Capabilities

From engine module

Motor.INIT()               | Setup variables
Motor.sys("ls") | Examination Function
Motor.R() | Reset variables
Motor.protect() | Cover bash heritage
Engine.compress() | Compress information
Motor.port_scanner() | Repleced by automap
Engine.search() | Look for whois, email messages, banner grep
Engine.position() | Present machine position
Motor.dns_scanner() | Scan for 'A', 'AAAA', 'CNAME', 'MX', 'NS', 'PTR', 'SOA'
Emgine.dir_scanner() | Brute force for research files and folders
Engine.uncomplicated_scan() | Execute automap
Motor.assembly() | Backend purpose
Engine.exec() | Backend function

From Visual module

Visible.banner()             | Operate for present textual content 
Visible.website_dns() | Function for exhibit text
Visual.linux_information() | Function for display text
Visual.linux_folders() | Functionality for exhibit textual content
Visible.linux_util() | Purpose for exhibit textual content

From Interpreter Module

Interpreter.interpreter()   | Backend operate
Interpreter.principal() | Backend functionality

Mistake CODES & Hues

prGreen()                   | Succesful
prRed() | Mistake
Other[Cyan, yellow] | Execultion mistake

Image and Short article Source url

Read through Additional on Pentesting Resources

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *