sQuo Posted May 6, 2013 Share Posted May 6, 2013 This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up Download This is the hidden content, please Sign In or Sign Up Description netool.sh {bash script} V2.4 Operative Systems Suported: Linux, BSD, Mac osx,Backtrack Dependencies: zenmap (nmap-gui) ettercap-ng driftnet sslstrip macchanger metasploit description of the script * netool.sh is a script in bash to automate frameworks like Nmap,Driftnet,SSLstrip and ettercap MITM attacks also uses macchanger to decoy scans, then uses nmap to search for a specified port open in external lan, change/see your mac address, change my PC hostname. this script makes it easy tasks such as SNIFFING, MITM, SSLsniff, retrieve metadata, and DoS attacks inside the external/local network can also perform TCP/UDP packets manipulation using etter.filters also as the hability of capture pictures of web-browser surfing on the target machine under MITM attack and preforms a vuln scan to target web-site using websecurify addon , also uses [msfpayload+msfencode+msfcli] to have remote control of target machine, also came with [root3.rb] meterpreter ruby auxiliary script Features Ping remote target or web domain Show Local Connections (see my machine connections) Show my Ip address and arp cache see/change macaddress change my PC hostname Scan Local network (search for live hosts inside local network) search in external lan for hosts Scan remote host (using nmap to perform a scan to target machine) execute Nmap command (direct from shell) Open router config page search for target geo-location Ip tracer whois (open website database whois and geo-location) WebCrawler (open websecurify webcrawler website) DDoS java Script (perform DDoS attacks external network) Retrieve metadata (from a web-domain) Config ettercap (etter.conf)) Launch MITM (using ettercap to perform MITM) show URLs visited (by target machine under MITM) Sniff remote pics (by target machine under MITM) sniff SSL-HTTPS logins Dns-Spoofing (redirect web-domains to another ip address) DoS attack (local netwok) Compile etter.filters execute ettercap filter make/encode payloads [metasplit] edit/execute root3.rb on a meterpreter session open start a listener [metasploit] webcrawler d. Delete lock folders a. about netool q. quit Link to comment Share on other sites More sharing options...
Recommended Posts