APT2: An Automated PenTesting Toolkit Written In Python 2
hack meaning
About APT2 - An Automated Penetration Testing Toolkit
This tool will perform an NMap scan, or import the results of a scan from Nexpose, Nessus, or NMap. The processesd results will be used to launch exploit and enumeration modules according to the configurable Safe Level and enumerated service information.
All module results are stored on localhost and are part of APT2's Knowledge Base (KB). The KB is accessible from within the application and allows the user to view the harvested results of an exploit module.
NOTE: APT2 is currently only tested on Linux based OSes. If you can confirm that it works on other OSes, please tell it to the author.
APT2 Installation
You have to install Metasploit Framework first:
* For Debian's distros:
sudo curl https://raw.githubusercontent.com/rapid7/metasploit-omnibus/master/config/templates/metasploit-framework-wrappers/msfupdate.erb > msfinstall
chmod 755 msfinstall && sudo ./msfinstall
* For Arch Linux's distros: sudo pacman -S metasploit
Current External Program/Script Dependencies
To make full use of all of APT2's modules, the following external dependencies should be install on your system: convert, dirb, hydra, java, jexboss, john, ldapsearch, msfconsole, nmap, nmblookup, phantomjs, responder, rpcclient, secretsdump.py, smbclient, snmpwalk, sslscan, xwd.
APT2 Configuration (Optional)
APT2 uses the default.cfg file in the misc directory. Edit this file to configure APT2 to run as you desire.
Metasploit RPC API (Metasploit): APT2 can utuilize your host's Metasploit RPC interface (MSGRPC). Additional Information can be found here: RPC API
NMAP: Configure NMAP scan settings to include the target, scan type, scan port range, and scan flags. These settings can be configured while the program is running.
Threading: Configure the number of the threads APT2 will use.
How to run APT2?
With no Options: python2 apt2.py
With Configuration File: python2 apt2.py -C <config.txt>
Import Nexpose, Nessus, or NMap XML: python2 apt2.py -f <nmap.xml>
Specify Target Range to Start: python2 apt2.py --target 192.168.1.0/24
Safe Level on APT2: Safe levels indicate how safe a module is to run againsts a target. The scale runs from 1 to 5 with 5 being the safest. The default configuration uses a Safe Level of 4 but can be set with the -s or --safelevel command line flags.
APT2 help menu
APT2 usage example
APT2's modules
Video about APT2
0 Comments:
Post a Comment
<< Home