https://github.com/carlospolop/legion
Automatic Enumeration Tool based in Open Source tools
https://github.com/carlospolop/legion
bruteforce enumeration hydra legion msf nmap nmap-scripts scanner vulnerabilty-scanner
Last synced: about 1 month ago
JSON representation
Automatic Enumeration Tool based in Open Source tools
- Host: GitHub
- URL: https://github.com/carlospolop/legion
- Owner: carlospolop
- License: mit
- Created: 2019-06-08T13:24:39.000Z (about 6 years ago)
- Default Branch: master
- Last Pushed: 2023-11-17T08:04:55.000Z (over 1 year ago)
- Last Synced: 2025-04-12T10:59:07.554Z (2 months ago)
- Topics: bruteforce, enumeration, hydra, legion, msf, nmap, nmap-scripts, scanner, vulnerabilty-scanner
- Language: Python
- Homepage: https://book.hacktricks.xyz/pentesting-methodology
- Size: 1.34 MB
- Stars: 919
- Watchers: 21
- Forks: 152
- Open Issues: 6
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# LEGION - Automatic Enumeration Tool
**Legion is based in the Pentesting Methodology that you can find in [book.hacktricks.xyz](https://book.hacktricks.xyz/pentesting-methodology).**
Legion is a tool that uses several well-known opensource tools to automatically, semi-automatically or *manually* enumerate the most frequent found services running in machines that you could need to pentest.
Basically, the goal of Legion is to extract all the information that you can from each opened network service, so you don't have to write and execute the same commands in a terminal every time you find that service.
Some actions are repeated by more than one tool, this is done to be sure that all the possible information is correctly extracted.[](https://asciinema.org/a/250539)
## Installation
### Installation of Legion
```sh
git clone https://github.com/carlospolop/legion.git /opt/legion
cd /opt/legion/git
./install.sh
ln -s /opt/legion/legion.py /usr/bin/legion
```For pentesting oracle services you should install manually some dependencies:
https://book.hacktricks.xyz/pentesting/1521-1522-1529-pentesting-oracle-listener/oracle-pentesting-requirements-installation### Docker
To have a nice experience with `legion` you can also build a container image using `docker` or `podman`, just typing the following commands:
```docker build -t legion . ```
And start the container:
```docker run -it legion bash```
You will have a ready-to-use `legion` container image (To execute legion inside the container run `./legion.py`).
Or you can just download the dockerhub container with:
```docker pull carlospolop/legion:latest```
## Protocols Supported
You can get a list using the command `protos`

## Brute force
All the protocols included in Legion that could be brute force, can be brute force using Legion. To see if a service can be brute forced and which command line will be used to do so (by default "hydra" is implemented, if hydra was not available metasploit or nmap will be used) set the protocol and the set the intensity to "3".Example of brute forcing ssh:

## Internal Commands

Use the `help` internal command to get info about what each command does.
## Automatic Scan
Just lauch the internal command `startGeneral` and the '**General**' will start scanning ports and services automatically.
## Semi-Automatic Scan
You can set all the options properly and launch several commands to scan one service. You can do this using the command `run`.
## Manual Scan
You can execute just one command using `exec `. For example: `exec http_slqmap`
Some services have *on demand commands*, this commands can only be executed using this internal command (`exec`).
## Options

### domain
Set the domain of the DNS or of the user that you want to use
### extensions
Comma separeted list of possible extensions (to brute force files in a web server)
### host
It is the host that you want to attack (valid IP and domains)
Example:
```
set host 127.0.0.1
set host some.domain.com
```### intensity
There are 3 intensities:
- **1**: Basic checks executed
- **2**: All checks executed (Default)
- **3**: Brute force (check for availability)### ipv6
Ipv6 address of the victim, could be usefull for some commands
### notuse
You can set a list (separated by commands) of commands that you don't want to use. For example, if you don't want modules from metasploit to be executed:`set notuse msf`.
### password
Set here the password of the username you want to use.
### path
Web server file path
### plist
Set here the path to a list of passwords (by default LEGION has its own list)
### port
The port where the service is running. If "0", then the default port of the service will be used (you can see this information using `info`)
### proto
It is the protocol that you want to attack
Example:
```
set proto http
```### reexec
Set `True` if you want already executed commands to be executed again (by default is set to False).
### ulist
Set a value here if you want to brute force a list of usernames (by default LEGION has its own list of usernames)
### username
Set the username of the user that you want to use/brute-force(by default to brute-force a list of users is used).
### verbose
If `True` the output of the command will be displayed as soon as it ends. If `False` it won't.
If `True` the output of `info` will show where each parameter is used, for example:

If `False` the output of `info` will show the values of the parameters, for example:

### workdir
Is the directory where the info of the victim is storaged. By default it is `$HOME/.legion`
By Polop(TM)