Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/francescodisalesgithub/hobo-hacker
hacking tools using basic linux command line tools instead of complex frameworks
https://github.com/francescodisalesgithub/hobo-hacker
bash bash-script bash-scripting challenge curl hacking netcat network
Last synced: 12 days ago
JSON representation
hacking tools using basic linux command line tools instead of complex frameworks
- Host: GitHub
- URL: https://github.com/francescodisalesgithub/hobo-hacker
- Owner: FrancescoDiSalesGithub
- License: gpl-3.0
- Created: 2024-09-28T17:14:37.000Z (3 months ago)
- Default Branch: main
- Last Pushed: 2024-10-25T19:05:24.000Z (about 2 months ago)
- Last Synced: 2024-10-26T07:46:50.857Z (about 2 months ago)
- Topics: bash, bash-script, bash-scripting, challenge, curl, hacking, netcat, network
- Language: Shell
- Homepage:
- Size: 178 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# hobo-hacker
![logo](OIG1.cjr18.jpeg)
hacking tools using basic linux command and bash shell scripting instead of complex frameworks
# Summary
* Introduction
* fuzzing tools
* ip sweep
* port scanning
* Rest api calls
* Cracking hash
* port forwarding
* banner-grabbing
* proxy
* tracking-open-files
* logger
* https dump
* postgresql bruteforce
* Donation## Introduction
Since most commons frameworks are easily detectable by siem investigation, the goal of this repository is to implement hacking techniques using basic linux command tools like: netcat, curl, ping.## Fuzzing tools
Is it possible with curl to create a simple web fuzzer. Here the bash scripts:
* hostfuzzing
* subdomainfuzzing
* virtualhostfuzzingFor these scripts pass:
* as first argument the host
* as second argument the fuzz fileExample:
```
bash hostfuzzing.sh google.it seclists/Discovery/Web-Content/directory-list-2.3-small.txt
```## IP sweep
Is it possible to enumerate a LAN network by simply using the ip utils. The bash script that does this functionality is **pingsweep.sh*.
Example usage:
```
bash pingsweep.sh 192.168.40
```## Port scanning
With netcat is it possible to create a simple port scanning. The bash scripting strategy uses two solutions:
* A full port scanning => it iterates until the last port passed
* A selected port range => it iterates in a text file selected portsIn the first solution the bash script is the following:
```
bash portscanning.sh 127.0.0.1 80
```
For the second solution the bash script is the following:
```
bash portspecificscanning.sh 127.0.0.1 ports.txt
```## Rest api calls
With curl is possible to do rest api calls, the bash script here do a get call and a json request rest api call:
* get.sh
* jsonpost.shFor get.sh it's enough to pass only as paramter the URL without http or https:
```
bash get.sh google.it/images
```
For jsonpost.sh for first parameter it's mandatory the host, and as the second paramter the json body:
```
bash jsonpost.sh myvulnsite.com {"value":1}
```## Cracking hash
The following bash scripts crack the following hash algorithm using dictionary attack:
* md5cracker.sh => cracks md5 hashes
* sha1cracker.sh => cracks sha1 hashes
* sha256cracker.sh => cracks sha256 hashesFor each of these bash scripts pass as first argument the hash and as second argument the dictionary file:
```
bash md5cracker.sh b1946ac92492d2347c6235b4d2611184 dictionary.txt
```## Port forwarding
To forward the traffic to a port for a specific service you need to launch **portforwarding.sh** as the following:
```
bash portforwarding.sh YOUR_LOCAL_PORT SERVICE_IP SERVICE_PORT
```
where:
* YOUR_LOCAL_PORT = the port where you want to forward traffic
* SERVICE_IP = the ip of your service
* SERVICE_PORT = the port of your service## Banner grabbing
Just insert the host where you want to grab the banner
```
bash bannergrabbing.sh
```## Proxy
Just insert the port where the proxy has to listen:
```
bash proxy.sh 1234
```## Tracking Open Files
It tracks the file opened by a specific application. If you don't want to save the logs to a file just run:
```
bash tracking-open-file-program.sh /bin/application
```
if you want to save the logs to a file just add as second paramter the path where you want to save the dump:
```
bash tracking-open-file-program.sh /bin/application /home/user/dump/dump.txt
```## Logger
Logs the content of a specific file by listening on a specific port:
```
bash logger.sh /var/log/nginx/access.log 1234
```## https dump
Dumps https traffic on client side:
```
bash httpsdump.sh /home/myuser wlan0
```## Postgresql bruteforce
Run the pgsql-brute.sh script passing the following arguments:
* user
* host
* dictionary fileIf the password is found the script will print the following output:
```
PASSWORD FOUND: [ mypassword ]
```Where the password is in the square brackets
# Donation
I hope you found this experiment interesting. I love creating open-source projects and sharing knowledge with the community. If you’d like to support my future work, you can do so in a couple of ways:
* 💰 Donate Monero (XMR): ```4B9WQivaHfd3miDfPKEfCianocGpBx9d8FXycz2vmNW3aBDVKHgkBd9Gmapt4RBVEpTwnehujsiUBBehUiLvnEHs7VFstCC```
* 💵 Donate via PayPal: https://www.paypal.me/francescodisalesEvery donation helps me continue building tools, research, and experiments for the benefit of the community. Thank you for your support!