Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/yezz123/athena
Test your Security Skills, and Clean Code Development as a Pythonist, Hacker & Warrior 🥷🏻
https://github.com/yezz123/athena
athena flask hacking linux owasp pentesting python security shell sqlite3 vulnerability
Last synced: about 8 hours ago
JSON representation
Test your Security Skills, and Clean Code Development as a Pythonist, Hacker & Warrior 🥷🏻
- Host: GitHub
- URL: https://github.com/yezz123/athena
- Owner: yezz123
- License: mit
- Created: 2020-10-15T21:49:35.000Z (about 4 years ago)
- Default Branch: main
- Last Pushed: 2024-04-29T23:21:23.000Z (7 months ago)
- Last Synced: 2024-11-11T21:37:28.586Z (3 days ago)
- Topics: athena, flask, hacking, linux, owasp, pentesting, python, security, shell, sqlite3, vulnerability
- Language: Python
- Homepage: https://blog.yezz.me/blog/Story-of-Athena
- Size: 2.83 MB
- Stars: 46
- Watchers: 5
- Forks: 22
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- Contributing: docs/CONTRIBUTING.md
- Funding: .github/FUNDING.yml
- License: LICENSE
- Code of conduct: docs/CODE_OF_CONDUCT.md
- Security: docs/SECURITY.md
Awesome Lists containing this project
README
![Athena](docs/img/header.svg)
# ATHENA
Athena is a web application developed in Python-Flask-SQLite for testing your skills as a Hacker, Coder and Warrior.
## Getting Started
- Athena Work Only on Linux Environment, that why you need to use a Linux Distribution ex. Ubuntu, CentOS, Kali Linux.
- Is Preferred to Install one of The Pentesting OS like Kali Linux or Parrot Security OS or Black Arch.
- Check that you have install `SQLite` or you can install it fast with `sudo apt install sqlite3`.### Prerequisites
- Python 3.6 or higher.
- Flask.
- Docker (Optional).### Project setup
```sh
# clone the repo
$ git clone https://github.com/yezz123/Athena# move to the project folder
$ cd Athena
```### Creating virtual environment
- Install `pipenv` a global python project `pip install pipenv`.
- Create a `virtual environment` for this project.```shell
# creating pipenv environment for python 3
$ pipenv --three# activating the pipenv environment
$ pipenv shell# if you have multiple python 3 versions installed then
$ pipenv install -d --python 3.8# install all dependencies (include -d for installing dev dependencies)
$ pipenv install -d
```- After Installing the requirements, Now you will be able to do some steps to run Athena :
```sh
# Prefer to use a Pentesting OS ex. Kali Linux or Parrot Security
$ sudo ./install.sh
```- And the key will be registered and you can run now Athena.
### Database Initialization
- Both, `BAD` and `GOOD` versions, requires an initialization of the database.
- This is done by running the `db_init.py` inside each of the directories.
- Each version has their own sqlite files for the users and posts.
- The execution of the script is, for example:
```sh
# Move to the Bad Directory
$ cd bad
# Run the Initialization as Root
$ sudo ./db_init.py
```- Or :
```sh
# Move to the Good Directory
$ cd good
# Run the Initialization as Root
$ sudo ./db_init.py
```### Running the Application
- To run the Application after Database Initialization, you need to choose between 2 version `Athena` or `Athena-SSL`.
```sh
# if you run the Initialization in the Bad Directories you need to run the Bad/Athena.py$ sudo python Athena.py
# Create a Certificate Key and implement it on the ssl configuration to run the SSL version.
# if you run the Initialization in the Bad Directories you need to run the Bad/Athena-ssl.py
$ sudo python Athena-ssl.py
```### Default Credentials
- After database initialization and Running the Application, three users are created:
| Username | Password |
| -------- | :---------: |
| admin | SuperSecret |
| elliot | 123123123 |
| tim | 12345678 |- You can use one of them to log into it, the application doesn't have a permissions system, so, the three have the same permissions.
## Running the Docker Container
- We have the Dockerfile created in above section. Now, we will use the Dockerfile to create the image of Athena app and then start the Image app container.
- You could use a pre-configured `Makefile` to build the image and start the container.
```sh
# Build the image
$ make build
# Start the container
$ make start
```## FAQ
### What is the ASVS?
- The OWASP Application Security Verification Standard (ASVS) Project provides a basis for testing web application technical security controls and also provides developers with a list of requirements for secure development.
- The primary aim of the OWASP Application Security Verification Standard (ASVS) Projectis to normalize the range in the coverage and level of rigor available in the market when it comes to performing Web application security verification using a commercially-workable open standard. The standard provides a basis for testing application technical security controls, as well as any technical security controls in the environment, that are relied on to protect against vulnerabilities such as Cross-Site Scripting (XSS) and SQL injection. This standard can be used to establish a level of confidence in the security of Web applications. The requirements were developed with the following objectives in mind:
- [x] - Use as a metric- Provide application developers and application owners with a yardstick with which to assess the degree of trust that can be placed in their Web applications,
- [x] - Use as guidance- Provide guidance to security control developers as to what to build into security controls in order to satisfy application security requirements, and
- [x] - Use during procurement- Provide a basis for specifying application security verification requirements in contracts.
### what are the Features that Athena Provide ?
- Login/Logout
- Read posts from other users
- Publish posts
- Multi-Factor Authentication (MFA)
- API for read and write posts
- Content Security Policy
- SSL/TLS Server### What are the Vulnerabilities that `Bad` Folder Provide ?
Some of the vulnerabilities present on the "BAD" version:
- Cross-Site Scripting (XSS)
- SQL Injection
- Cross Site Request Forgery (CSRF)
- Session Impersonation
- Insecure Deserialization
- Authentication Bruteforce
- Authentication BypassUnderstand More about the vulnerabilities That Athena Provide by Reading the [Helper.md](docs/Helper.md).
### What is the Reason of Creating Athena ?
Behind lines , Why I choose this name cause it look more dramatic for the project.I am inspired a lot from Athena for example, how she was a great woman with a great power & how she inspire from life and acting for civilization.
That is for you, cause when you try to escape and use Athena, you break into a world of 0's & 1's for testing your power of coding and breaking into the hidden part.
The good side or the side where I respect all OWASP ASVS that show also the good side of thinking that Athena has.
The bad side is where you can test your hidden skills and see if you can break the rules to making it a safe one like Athena did when she fight for civilization.
But this is not a civilization war is a war again vulnerability, develop your skills of coding & problem solving with it.
- Read More here :
## Contributing
- Join the Athena's Creator and Contribute to the Project if you have any enhancement or add-ons to create a good and Secure Project, Help any User to Use it in a good and simple way.
- Don't forget to check the [CONTRIBUTING.md](CONTRIBUTING.md) file to understand the contribution process.### Disclaimer
This project can only be used for educational purposes. Using this software against target systems without prior permission is illegal, and any damages from misuse of this software will not be the responsibility of the author.
## License
This project is licensed under the terms of the MIT license.