SlideShare ist ein Scribd-Unternehmen logo
1 von 35
HEYBE – Pentest Toolkit
Bahtiyar Bircan
bahtiyarb@gmail.com
http://github.com/heybe
BlackHat Arsenal USA 2015 – 6 August 2015
2
Pentesting Recap
What is Heybe Toolkit?
Flashlight
Crowbar
SeeS
Network9 ( DepDep)
Agenda
BlackHat Arsenal USA – 2015
Penetration Testing Recap
3BlackHat Arsenal USA – 2015
Pentest Types
4
Internal Pentest
External Pentest
Web Application Tests
Database Test
Social Engineering
DDoS Tests
Active Directory
Wifi Tests
…
BlackHat Arsenal USA – 2015
Some Problems During Pentests
5
Very large networks
Limited time
Forgetting to save results
Scan reports
Screenshots
Non standard Nmap parameters
Non-standard nmap report names
Bruteforce unusual applications
BlackHat Arsenal USA – 2015
HEYBE Toolkit
6
What is HEYBE Toolkit
7BlackHat Arsenal USA – 2015
HEYBE is toolkit for everyday pentest usage
Automates common test phases
Provides standardized reports and outputs
Developers
8
Gökhan Alkan
 TUBITAK Cyber Security Institute
 Email: cigalkan@gmail.com
 Github: github.com/galkan
 Twitter: @gokhan_alkn
Bahtiyar Bircan
 Barikat Akademi
(www.barikatakademi.com.tr)
 Email: bahtiyarb@gmail.com
 Github: github.com/bahtiyarb
 Twitter: @bahtiyarb
BlackHat Arsenal USA – 2015
WHY?
9
Automate and speed up boring/standard steps
More time for fun like SE
Standardize test results
Save results for reporting
BlackHat Arsenal USA – 2015
HOW?
10BlackHat Arsenal USA – 2015
HEYBE Toolkit
11
Code available on Github
https://github.com/heybe
https://github.com/galkan/flashlight
https://github.com/galkan/crowbar
https://github.com/galkan/sees
https://github.com/galkan/depdep
First published at Blackhat USA 2014
BlackHat Arsenal USA – 2015
Modules
12BlackHat Arsenal USA – 2015
Penetration Test Phases – Heybe
13BlackHat Arsenal USA – 2015
Flashlight
14
Flashlight (Fener)
15
Information Gathering & Recon Tool
https://github.com/heybe/fener
3 Different Recon Methods
Active Scan
Passive Scan
Screenshot Scan
BlackHat Arsenal USA – 2015
Flashlight (Fener) – Active Scan
16
Leverages Nmap for active port scanning
Custom config file for scan parameters
Ports
NSE Scripts
Save scan results with standard report name
Multithreaded Nmap scans
Ping Scan
Service & OS Scan
Script Scan
BlackHat Arsenal USA – 2015
Flashlight (Fener) – Passive Scan
17
Stealth network recon
Passive traffic capture
Arpspoof MitM support
Traffic saved in pcap file
Valuable information extracted from traffic
Hosts
Ports
Windows hostnames
Top 10 HTTP hosts
Top 10 DNS domains
BlackHat Arsenal USA – 2015
Flashlight (Fener) – Screenshot Scan
18
Used to quickly discover web applications in network
Save screenshots of discovered web apps
Standard screenshot filenames
Used for
Offline examination
Pentest report
BlackHat Arsenal USA – 2015
Flashlight (Fener) – Usage
19
Active Scan
• ./flashlight.py -p 1 -s active -d 10.0.0.27 -v
Screenshot Scan
• ./flashlight.py -p 1 -s screen -d 10.0.0.27 -v
Passive Scan
• ./flashlight.py -p 1 -s passive -i eth1 -k 30 -g 10.0.0.10 -v
Filter Results
• ./flashlight.py -p 3 -s filter -f /root/Dump/dump4-browser.pcap -v
BlackHat Arsenal USA – 2015
Flashlight (Fener) – Demo Videos
20
Heybe - Flashlight Active Scan :
• https://youtu.be/Li6skbC42C8
Heybe - Flashlight Filtering
• https://youtu.be/9wft9zuh1f0
Heybe - Flashlight Passive Scan
• https://youtu.be/98Soe01swR8
Heybe - Flashlight Screenshot Scan
• https://youtu.be/qCgW-SfYl1c
BlackHat Arsenal USA – 2015
Crowbar
21
Crowbar
22
Brute Force Tool
https://github.com/galkan/crowbar
Supported protocols:
OpenVPN
Remote Desktop Protocol (with NLA support)
SSH Private Key
VNC Passwd
Reporting
Debug Logging
BlackHat Arsenal USA – 2015
Crowbar - Usage
23
Brute Force RDP Servers
• ./crowbar.py -b rdp -s 10.0.0.14/32 -U users.txt -C pass.txt
Brute Force OpenVPN
• ./crowbar.py -b openvpn -s 10.0.0.29/32 -p 443 -m ovpn-config.ovpn -k
ovpn-ca.crt -u test -c test –v
Brute Force SSH Servers
• ./crowbar.py -b sshkey -s 10.0.0.0/24 -k sshkeys/ -U users.txt -v -d
Brute Force VNC
• ./crowbar.py -b vnckey -s 192.168.2.105/32 -p 5902 -k /root/.vnc/passwd
BlackHat Arsenal USA – 2015
Crowbar – Demo Videos
24
Heybe - Crowbar OpenVPN Bruteforcing
• https://youtu.be/4QZAWGsveSM
Heybe - Crowbar RDP Bruteforcing
• https://youtu.be/i_byBBlpZoE
Heybe - Crowbar SSH Bruteforcing
• https://youtu.be/IOSUpAFaL6E
BlackHat Arsenal USA – 2015
SeeS
25
SeeS
26
Social Engineering Tool
https://github.com/heybe/sees
Send targeted SE mails in bulk
HTML mail body
Multiple attachment
Local/Remote SMTP server support
BlackHat Arsenal USA – 2015
SeeS - Usage
27
Sending e-mail with html body
• ./sees.py -c config/sees.cfg -m config/user.bbusa --text --html_file
data/html.text_link -v
Sending e-mail with attachments
• ./sees.py -c config/sees.cfg -m config/user.bbusa --html_file
data/html.text --attach data/sample.docx -v
Demo video
• https://youtu.be/6sNu8gJoT3k
BlackHat Arsenal USA – 2015
Network9
28
Network9 (DepDep)
29
Post-Exploitation Tool
https://github.com/heybe/depdep
Discover sensitive files in network shares
Works with Windows SMB shares
Can search sensitive information within
file name and
file contents
BlackHat Arsenal USA – 2015
Network9 (DepDep) - Usage
30
Discover sensitive files in windows shares
• ./depdep.py -f config/depdep.xml -v 1 -w 1
Demo video
• https://youtu.be/XxnU3C-pZSg
BlackHat Arsenal USA – 2015
Summary
31BlackHat Arsenal USA – 2015
Summary – Detailed
32BlackHat Arsenal USA – 2015
Summary – Detailed
33BlackHat Arsenal USA – 2015
Referenses
 Source Code :
• https://github.com/heybe
• https://github.com/galkan/sees
• https://github.com/galkan/depdep
• https://github.com/galkan/sees
• https://github.com/galkan/kacak
• https://github.com/galkan/fener
• https://github.com/galkan/crowbar
 Youtube Demo Links :
• Playlist https://www.youtube.com/playlist?list=PL1BVM6VWlmWZOv9Hv8TV2v-kAlUmvA5g7
• Heybe - Flashlight Active Scan : https://youtu.be/Li6skbC42C8
• Heybe - Flashlight Active Network Scan https://youtu.be/EUMKffaAxzs
• Heybe - Flashlight Filtering https://youtu.be/9wft9zuh1f0
• Heybe - Flashlight Passive Scan https://youtu.be/98Soe01swR8
• Heybe - Flashlight Screenshot Scan https://youtu.be/qCgW-SfYl1c
• Heybe - Crowbar OpenVPN Bruteforcing https://youtu.be/4QZAWGsveSM
• Heybe - Crowbar RDP Bruteforcing https://youtu.be/i_byBBlpZoE
• Heybe - Crowbar SSH Bruteforcing https://youtu.be/IOSUpAFaL6E
• Heybe - Kacak https://youtu.be/ctP8QHDMYQM
• Heybe - NetworK9 https://youtu.be/XxnU3C-pZSg
• Heybe - SeeS Social Engineering Demo https://youtu.be/6sNu8gJoT3k
34
BlackHat Arsenal USA – 6 August 2015
Bahtiyar Bircan
bahtiyarb@gmail.com
https://github.com/heybe

Weitere ähnliche Inhalte

Was ist angesagt?

Test & Tea : ITSEC testing, manual vs automated
Test & Tea : ITSEC testing, manual vs automatedTest & Tea : ITSEC testing, manual vs automated
Test & Tea : ITSEC testing, manual vs automatedZoltan Balazs
 
Practical White Hat Hacker Training - Post Exploitation
Practical White Hat Hacker Training - Post ExploitationPractical White Hat Hacker Training - Post Exploitation
Practical White Hat Hacker Training - Post ExploitationPRISMA CSI
 
Best Practices of Static Code Analysis in the SDLC
Best Practices of Static Code Analysis in the SDLCBest Practices of Static Code Analysis in the SDLC
Best Practices of Static Code Analysis in the SDLCParasoft_Mitchell
 
Practical White Hat Hacker Training - Exploitation
Practical White Hat Hacker Training - ExploitationPractical White Hat Hacker Training - Exploitation
Practical White Hat Hacker Training - ExploitationPRISMA CSI
 
5 Bare Minimum Things A Web Startup CTO Must Worry About
5 Bare Minimum Things A Web Startup CTO Must Worry About5 Bare Minimum Things A Web Startup CTO Must Worry About
5 Bare Minimum Things A Web Startup CTO Must Worry AboutIndus Khaitan
 
2014 ZAP Workshop 1: Getting Started
2014 ZAP Workshop 1: Getting Started2014 ZAP Workshop 1: Getting Started
2014 ZAP Workshop 1: Getting StartedSimon Bennetts
 
Practical White Hat Hacker Training - Vulnerability Detection
Practical White Hat Hacker Training - Vulnerability DetectionPractical White Hat Hacker Training - Vulnerability Detection
Practical White Hat Hacker Training - Vulnerability DetectionPRISMA CSI
 
Red Team Methodology - A Naked Look
Red Team Methodology - A Naked LookRed Team Methodology - A Naked Look
Red Team Methodology - A Naked LookJason Lang
 
2017 Codemotion OWASP ZAP in CI/CD
2017 Codemotion OWASP ZAP in CI/CD2017 Codemotion OWASP ZAP in CI/CD
2017 Codemotion OWASP ZAP in CI/CDSimon Bennetts
 
OWASP 2013 APPSEC USA ZAP Hackathon
OWASP 2013 APPSEC USA ZAP HackathonOWASP 2013 APPSEC USA ZAP Hackathon
OWASP 2013 APPSEC USA ZAP HackathonSimon Bennetts
 
Bug bounties - cén scéal?
Bug bounties - cén scéal?Bug bounties - cén scéal?
Bug bounties - cén scéal?Ciaran McNally
 
JavaOne 2014 Security Testing for Developers using OWASP ZAP
JavaOne 2014 Security Testing for Developers using OWASP ZAPJavaOne 2014 Security Testing for Developers using OWASP ZAP
JavaOne 2014 Security Testing for Developers using OWASP ZAPSimon Bennetts
 
BSidesJXN 2017 - Improving Vulnerability Management
BSidesJXN 2017 - Improving Vulnerability ManagementBSidesJXN 2017 - Improving Vulnerability Management
BSidesJXN 2017 - Improving Vulnerability ManagementAndrew McNicol
 
2014 ZAP Workshop 2: Contexts and Fuzzing
2014 ZAP Workshop 2: Contexts and Fuzzing2014 ZAP Workshop 2: Contexts and Fuzzing
2014 ZAP Workshop 2: Contexts and FuzzingSimon Bennetts
 
Secure Node Code (workshop, O'Reilly Security)
Secure Node Code (workshop, O'Reilly Security)Secure Node Code (workshop, O'Reilly Security)
Secure Node Code (workshop, O'Reilly Security)Guy Podjarny
 
BSides Manchester 2014 ZAP Advanced Features
BSides Manchester 2014 ZAP Advanced FeaturesBSides Manchester 2014 ZAP Advanced Features
BSides Manchester 2014 ZAP Advanced FeaturesSimon Bennetts
 
BSides_Charm2015_Info sec hunters_gathers
BSides_Charm2015_Info sec hunters_gathersBSides_Charm2015_Info sec hunters_gathers
BSides_Charm2015_Info sec hunters_gathersAndrew McNicol
 
AllDayDevOps ZAP automation in CI
AllDayDevOps ZAP automation in CIAllDayDevOps ZAP automation in CI
AllDayDevOps ZAP automation in CISimon Bennetts
 
Practical White Hat Hacker Training - Introduction to Cyber Security
Practical White Hat Hacker Training - Introduction to Cyber SecurityPractical White Hat Hacker Training - Introduction to Cyber Security
Practical White Hat Hacker Training - Introduction to Cyber SecurityPRISMA CSI
 
Stranger Danger: Securing Third Party Components (Tech2020)
Stranger Danger: Securing Third Party Components (Tech2020)Stranger Danger: Securing Third Party Components (Tech2020)
Stranger Danger: Securing Third Party Components (Tech2020)Guy Podjarny
 

Was ist angesagt? (20)

Test & Tea : ITSEC testing, manual vs automated
Test & Tea : ITSEC testing, manual vs automatedTest & Tea : ITSEC testing, manual vs automated
Test & Tea : ITSEC testing, manual vs automated
 
Practical White Hat Hacker Training - Post Exploitation
Practical White Hat Hacker Training - Post ExploitationPractical White Hat Hacker Training - Post Exploitation
Practical White Hat Hacker Training - Post Exploitation
 
Best Practices of Static Code Analysis in the SDLC
Best Practices of Static Code Analysis in the SDLCBest Practices of Static Code Analysis in the SDLC
Best Practices of Static Code Analysis in the SDLC
 
Practical White Hat Hacker Training - Exploitation
Practical White Hat Hacker Training - ExploitationPractical White Hat Hacker Training - Exploitation
Practical White Hat Hacker Training - Exploitation
 
5 Bare Minimum Things A Web Startup CTO Must Worry About
5 Bare Minimum Things A Web Startup CTO Must Worry About5 Bare Minimum Things A Web Startup CTO Must Worry About
5 Bare Minimum Things A Web Startup CTO Must Worry About
 
2014 ZAP Workshop 1: Getting Started
2014 ZAP Workshop 1: Getting Started2014 ZAP Workshop 1: Getting Started
2014 ZAP Workshop 1: Getting Started
 
Practical White Hat Hacker Training - Vulnerability Detection
Practical White Hat Hacker Training - Vulnerability DetectionPractical White Hat Hacker Training - Vulnerability Detection
Practical White Hat Hacker Training - Vulnerability Detection
 
Red Team Methodology - A Naked Look
Red Team Methodology - A Naked LookRed Team Methodology - A Naked Look
Red Team Methodology - A Naked Look
 
2017 Codemotion OWASP ZAP in CI/CD
2017 Codemotion OWASP ZAP in CI/CD2017 Codemotion OWASP ZAP in CI/CD
2017 Codemotion OWASP ZAP in CI/CD
 
OWASP 2013 APPSEC USA ZAP Hackathon
OWASP 2013 APPSEC USA ZAP HackathonOWASP 2013 APPSEC USA ZAP Hackathon
OWASP 2013 APPSEC USA ZAP Hackathon
 
Bug bounties - cén scéal?
Bug bounties - cén scéal?Bug bounties - cén scéal?
Bug bounties - cén scéal?
 
JavaOne 2014 Security Testing for Developers using OWASP ZAP
JavaOne 2014 Security Testing for Developers using OWASP ZAPJavaOne 2014 Security Testing for Developers using OWASP ZAP
JavaOne 2014 Security Testing for Developers using OWASP ZAP
 
BSidesJXN 2017 - Improving Vulnerability Management
BSidesJXN 2017 - Improving Vulnerability ManagementBSidesJXN 2017 - Improving Vulnerability Management
BSidesJXN 2017 - Improving Vulnerability Management
 
2014 ZAP Workshop 2: Contexts and Fuzzing
2014 ZAP Workshop 2: Contexts and Fuzzing2014 ZAP Workshop 2: Contexts and Fuzzing
2014 ZAP Workshop 2: Contexts and Fuzzing
 
Secure Node Code (workshop, O'Reilly Security)
Secure Node Code (workshop, O'Reilly Security)Secure Node Code (workshop, O'Reilly Security)
Secure Node Code (workshop, O'Reilly Security)
 
BSides Manchester 2014 ZAP Advanced Features
BSides Manchester 2014 ZAP Advanced FeaturesBSides Manchester 2014 ZAP Advanced Features
BSides Manchester 2014 ZAP Advanced Features
 
BSides_Charm2015_Info sec hunters_gathers
BSides_Charm2015_Info sec hunters_gathersBSides_Charm2015_Info sec hunters_gathers
BSides_Charm2015_Info sec hunters_gathers
 
AllDayDevOps ZAP automation in CI
AllDayDevOps ZAP automation in CIAllDayDevOps ZAP automation in CI
AllDayDevOps ZAP automation in CI
 
Practical White Hat Hacker Training - Introduction to Cyber Security
Practical White Hat Hacker Training - Introduction to Cyber SecurityPractical White Hat Hacker Training - Introduction to Cyber Security
Practical White Hat Hacker Training - Introduction to Cyber Security
 
Stranger Danger: Securing Third Party Components (Tech2020)
Stranger Danger: Securing Third Party Components (Tech2020)Stranger Danger: Securing Third Party Components (Tech2020)
Stranger Danger: Securing Third Party Components (Tech2020)
 

Andere mochten auch

PwnPhone - Cepteki Ninja
PwnPhone - Cepteki Ninja PwnPhone - Cepteki Ninja
PwnPhone - Cepteki Ninja Bahtiyar Bircan
 
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 1, 2, 3
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 1, 2, 3Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 1, 2, 3
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 1, 2, 3BGA Cyber Security
 
Cloud Computing v.s. Cyber Security
Cloud Computing v.s. Cyber Security Cloud Computing v.s. Cyber Security
Cloud Computing v.s. Cyber Security Bahtiyar Bircan
 
Solarwinds Orion NPM ve NTA sunumu
Solarwinds Orion NPM ve NTA sunumuSolarwinds Orion NPM ve NTA sunumu
Solarwinds Orion NPM ve NTA sunumuKavi International
 
Açık Kaynak Sistemlerle Siber Saldırı Gözlemleme Sistemi Kurulum ve Yönetimi
Açık Kaynak Sistemlerle Siber Saldırı Gözlemleme Sistemi Kurulum ve YönetimiAçık Kaynak Sistemlerle Siber Saldırı Gözlemleme Sistemi Kurulum ve Yönetimi
Açık Kaynak Sistemlerle Siber Saldırı Gözlemleme Sistemi Kurulum ve YönetimiBilgiO A.S / Linux Akademi
 
Open Source Threat Intelligence | Açık Kaynak Tehdit İstihbaratı
Open Source Threat Intelligence | Açık Kaynak Tehdit İstihbaratıOpen Source Threat Intelligence | Açık Kaynak Tehdit İstihbaratı
Open Source Threat Intelligence | Açık Kaynak Tehdit İstihbaratıBilgiO A.S / Linux Akademi
 
Kurumsal Ağlarda Saldırı Tespiti Amaçlı Honeypot Sistemlerin Efektif Kullanımı
Kurumsal Ağlarda Saldırı Tespiti Amaçlı Honeypot Sistemlerin Efektif KullanımıKurumsal Ağlarda Saldırı Tespiti Amaçlı Honeypot Sistemlerin Efektif Kullanımı
Kurumsal Ağlarda Saldırı Tespiti Amaçlı Honeypot Sistemlerin Efektif KullanımıBGA Cyber Security
 
Siber Dünyada Modern Arka Kapılar
Siber Dünyada Modern Arka KapılarSiber Dünyada Modern Arka Kapılar
Siber Dünyada Modern Arka KapılarBGA Cyber Security
 
Log Yönetimi ve Saldırı Analizi Eğitimi - 2
Log Yönetimi ve Saldırı Analizi Eğitimi - 2Log Yönetimi ve Saldırı Analizi Eğitimi - 2
Log Yönetimi ve Saldırı Analizi Eğitimi - 2BGA Cyber Security
 
Disaster Recovery Presentation
Disaster Recovery PresentationDisaster Recovery Presentation
Disaster Recovery PresentationTimSchaefer
 
8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team
8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team
8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response TeamBGA Cyber Security
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Narudom Roongsiriwong, CISSP
 
Uygulamalı Ağ Güvenliği Eğitimi Lab Çalışmaları
Uygulamalı Ağ Güvenliği Eğitimi Lab ÇalışmalarıUygulamalı Ağ Güvenliği Eğitimi Lab Çalışmaları
Uygulamalı Ağ Güvenliği Eğitimi Lab ÇalışmalarıBGA Cyber Security
 
SIZMA TESTLERİNDE BİLGİ TOPLAMA
SIZMA TESTLERİNDE BİLGİ TOPLAMASIZMA TESTLERİNDE BİLGİ TOPLAMA
SIZMA TESTLERİNDE BİLGİ TOPLAMABGA Cyber Security
 
İleri Seviye Ağ Güvenliği Lab Kitabı
İleri Seviye Ağ Güvenliği Lab Kitabıİleri Seviye Ağ Güvenliği Lab Kitabı
İleri Seviye Ağ Güvenliği Lab KitabıBGA Cyber Security
 
Log Yönetimi ve Saldırı Analizi Eğitimi -1
Log Yönetimi ve Saldırı Analizi Eğitimi -1Log Yönetimi ve Saldırı Analizi Eğitimi -1
Log Yönetimi ve Saldırı Analizi Eğitimi -1BGA Cyber Security
 
Veri merkezi rehberi
Veri merkezi rehberiVeri merkezi rehberi
Veri merkezi rehberiMustafa Kuğu
 

Andere mochten auch (20)

PwnPhone - Cepteki Ninja
PwnPhone - Cepteki Ninja PwnPhone - Cepteki Ninja
PwnPhone - Cepteki Ninja
 
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 1, 2, 3
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 1, 2, 3Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 1, 2, 3
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 1, 2, 3
 
Cloud Computing v.s. Cyber Security
Cloud Computing v.s. Cyber Security Cloud Computing v.s. Cyber Security
Cloud Computing v.s. Cyber Security
 
Solarwinds Orion NPM ve NTA sunumu
Solarwinds Orion NPM ve NTA sunumuSolarwinds Orion NPM ve NTA sunumu
Solarwinds Orion NPM ve NTA sunumu
 
Açık Kaynak Sistemlerle Siber Saldırı Gözlemleme Sistemi Kurulum ve Yönetimi
Açık Kaynak Sistemlerle Siber Saldırı Gözlemleme Sistemi Kurulum ve YönetimiAçık Kaynak Sistemlerle Siber Saldırı Gözlemleme Sistemi Kurulum ve Yönetimi
Açık Kaynak Sistemlerle Siber Saldırı Gözlemleme Sistemi Kurulum ve Yönetimi
 
Open Source Threat Intelligence | Açık Kaynak Tehdit İstihbaratı
Open Source Threat Intelligence | Açık Kaynak Tehdit İstihbaratıOpen Source Threat Intelligence | Açık Kaynak Tehdit İstihbaratı
Open Source Threat Intelligence | Açık Kaynak Tehdit İstihbaratı
 
Kurumsal Ağlarda Saldırı Tespiti Amaçlı Honeypot Sistemlerin Efektif Kullanımı
Kurumsal Ağlarda Saldırı Tespiti Amaçlı Honeypot Sistemlerin Efektif KullanımıKurumsal Ağlarda Saldırı Tespiti Amaçlı Honeypot Sistemlerin Efektif Kullanımı
Kurumsal Ağlarda Saldırı Tespiti Amaçlı Honeypot Sistemlerin Efektif Kullanımı
 
Siber Dünyada Modern Arka Kapılar
Siber Dünyada Modern Arka KapılarSiber Dünyada Modern Arka Kapılar
Siber Dünyada Modern Arka Kapılar
 
Log Yönetimi ve Saldırı Analizi Eğitimi - 2
Log Yönetimi ve Saldırı Analizi Eğitimi - 2Log Yönetimi ve Saldırı Analizi Eğitimi - 2
Log Yönetimi ve Saldırı Analizi Eğitimi - 2
 
Ddos Sızma Testleri - 2
Ddos Sızma Testleri - 2Ddos Sızma Testleri - 2
Ddos Sızma Testleri - 2
 
Disaster Recovery Presentation
Disaster Recovery PresentationDisaster Recovery Presentation
Disaster Recovery Presentation
 
BGA Pentest Hizmeti
BGA Pentest HizmetiBGA Pentest Hizmeti
BGA Pentest Hizmeti
 
8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team
8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team
8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)
 
Uygulamalı Ağ Güvenliği Eğitimi Lab Çalışmaları
Uygulamalı Ağ Güvenliği Eğitimi Lab ÇalışmalarıUygulamalı Ağ Güvenliği Eğitimi Lab Çalışmaları
Uygulamalı Ağ Güvenliği Eğitimi Lab Çalışmaları
 
SIZMA TESTLERİNDE BİLGİ TOPLAMA
SIZMA TESTLERİNDE BİLGİ TOPLAMASIZMA TESTLERİNDE BİLGİ TOPLAMA
SIZMA TESTLERİNDE BİLGİ TOPLAMA
 
Sızma Testleri Sonuç Raporu
Sızma Testleri Sonuç RaporuSızma Testleri Sonuç Raporu
Sızma Testleri Sonuç Raporu
 
İleri Seviye Ağ Güvenliği Lab Kitabı
İleri Seviye Ağ Güvenliği Lab Kitabıİleri Seviye Ağ Güvenliği Lab Kitabı
İleri Seviye Ağ Güvenliği Lab Kitabı
 
Log Yönetimi ve Saldırı Analizi Eğitimi -1
Log Yönetimi ve Saldırı Analizi Eğitimi -1Log Yönetimi ve Saldırı Analizi Eğitimi -1
Log Yönetimi ve Saldırı Analizi Eğitimi -1
 
Veri merkezi rehberi
Veri merkezi rehberiVeri merkezi rehberi
Veri merkezi rehberi
 

Ähnlich wie HEYBE Toolkit Automates Pentesting

TriplePlay-WebAppPenTestingTools
TriplePlay-WebAppPenTestingToolsTriplePlay-WebAppPenTestingTools
TriplePlay-WebAppPenTestingToolsYury Chemerkin
 
Who Needs A Developer For Automated SharePoint Provisioning
Who Needs A Developer For Automated SharePoint ProvisioningWho Needs A Developer For Automated SharePoint Provisioning
Who Needs A Developer For Automated SharePoint ProvisioningEric Overfield
 
Owasp owtf the offensive (web) testing framework + ptes penetration testing e...
Owasp owtf the offensive (web) testing framework + ptes penetration testing e...Owasp owtf the offensive (web) testing framework + ptes penetration testing e...
Owasp owtf the offensive (web) testing framework + ptes penetration testing e...Mauro Risonho de Paula Assumpcao
 
Build Database Applications for SharePoint
Build Database Applications for SharePointBuild Database Applications for SharePoint
Build Database Applications for SharePointIron Speed
 
Build Database Applications for SharePoint!
Build Database Applications for SharePoint!Build Database Applications for SharePoint!
Build Database Applications for SharePoint!Iron Speed
 
Developing a Custom Video Solution with the 3Play Media API
Developing a Custom Video Solution with the 3Play Media APIDeveloping a Custom Video Solution with the 3Play Media API
Developing a Custom Video Solution with the 3Play Media API3Play Media
 
python small tools for CI and team cooperation
python small tools for CI and team cooperationpython small tools for CI and team cooperation
python small tools for CI and team cooperationDavid Chen
 
About Flink streaming
About Flink streamingAbout Flink streaming
About Flink streaming용휘 김
 
Performance profiling and testing of symfony application 2
Performance profiling and testing of symfony application 2Performance profiling and testing of symfony application 2
Performance profiling and testing of symfony application 2Andrew Yatsenko
 
L7 firewall API for Neutron-FWaaS
L7 firewall API for Neutron-FWaaSL7 firewall API for Neutron-FWaaS
L7 firewall API for Neutron-FWaaSnguyen phuong an
 
Your Inner Sysadmin - Tutorial (SunshinePHP 2015)
Your Inner Sysadmin - Tutorial (SunshinePHP 2015)Your Inner Sysadmin - Tutorial (SunshinePHP 2015)
Your Inner Sysadmin - Tutorial (SunshinePHP 2015)Chris Tankersley
 
sh404SEF, SEO and Analytics, JoomlaDay South Africa, Cape Town 2011
sh404SEF, SEO and Analytics, JoomlaDay South Africa, Cape Town 2011sh404SEF, SEO and Analytics, JoomlaDay South Africa, Cape Town 2011
sh404SEF, SEO and Analytics, JoomlaDay South Africa, Cape Town 2011Yannick Gaultier
 
Overview of webSpoon @ Pentaho Bay Area Meetup
Overview of webSpoon @ Pentaho Bay Area MeetupOverview of webSpoon @ Pentaho Bay Area Meetup
Overview of webSpoon @ Pentaho Bay Area MeetupHiromu Hota
 
Your Inner Sysadmin - MidwestPHP 2015
Your Inner Sysadmin - MidwestPHP 2015Your Inner Sysadmin - MidwestPHP 2015
Your Inner Sysadmin - MidwestPHP 2015Chris Tankersley
 
Profiling and inspection with Blackfire.io
Profiling and inspection with Blackfire.ioProfiling and inspection with Blackfire.io
Profiling and inspection with Blackfire.ioEmir Beganović
 
Software Quality Assurance Tooling - Wintersession 2024
Software Quality Assurance Tooling - Wintersession 2024Software Quality Assurance Tooling - Wintersession 2024
Software Quality Assurance Tooling - Wintersession 2024Henry Schreiner
 
Intro to Strapi 4
Intro to Strapi 4Intro to Strapi 4
Intro to Strapi 4Shadi Akil
 
Рабочие нагрузки Skype for business 2015 UC Lab
Рабочие нагрузки Skype for business 2015 UC LabРабочие нагрузки Skype for business 2015 UC Lab
Рабочие нагрузки Skype for business 2015 UC LabUC2
 

Ähnlich wie HEYBE Toolkit Automates Pentesting (20)

TriplePlay-WebAppPenTestingTools
TriplePlay-WebAppPenTestingToolsTriplePlay-WebAppPenTestingTools
TriplePlay-WebAppPenTestingTools
 
Who Needs A Developer For Automated SharePoint Provisioning
Who Needs A Developer For Automated SharePoint ProvisioningWho Needs A Developer For Automated SharePoint Provisioning
Who Needs A Developer For Automated SharePoint Provisioning
 
Owasp owtf the offensive (web) testing framework + ptes penetration testing e...
Owasp owtf the offensive (web) testing framework + ptes penetration testing e...Owasp owtf the offensive (web) testing framework + ptes penetration testing e...
Owasp owtf the offensive (web) testing framework + ptes penetration testing e...
 
Build Database Applications for SharePoint
Build Database Applications for SharePointBuild Database Applications for SharePoint
Build Database Applications for SharePoint
 
Build Database Applications for SharePoint!
Build Database Applications for SharePoint!Build Database Applications for SharePoint!
Build Database Applications for SharePoint!
 
Developing a Custom Video Solution with the 3Play Media API
Developing a Custom Video Solution with the 3Play Media APIDeveloping a Custom Video Solution with the 3Play Media API
Developing a Custom Video Solution with the 3Play Media API
 
python small tools for CI and team cooperation
python small tools for CI and team cooperationpython small tools for CI and team cooperation
python small tools for CI and team cooperation
 
About Flink streaming
About Flink streamingAbout Flink streaming
About Flink streaming
 
Performance profiling and testing of symfony application 2
Performance profiling and testing of symfony application 2Performance profiling and testing of symfony application 2
Performance profiling and testing of symfony application 2
 
L7 firewall API for Neutron-FWaaS
L7 firewall API for Neutron-FWaaSL7 firewall API for Neutron-FWaaS
L7 firewall API for Neutron-FWaaS
 
Your Inner Sysadmin - Tutorial (SunshinePHP 2015)
Your Inner Sysadmin - Tutorial (SunshinePHP 2015)Your Inner Sysadmin - Tutorial (SunshinePHP 2015)
Your Inner Sysadmin - Tutorial (SunshinePHP 2015)
 
sh404SEF, SEO and Analytics, JoomlaDay South Africa, Cape Town 2011
sh404SEF, SEO and Analytics, JoomlaDay South Africa, Cape Town 2011sh404SEF, SEO and Analytics, JoomlaDay South Africa, Cape Town 2011
sh404SEF, SEO and Analytics, JoomlaDay South Africa, Cape Town 2011
 
Overview of webSpoon @ Pentaho Bay Area Meetup
Overview of webSpoon @ Pentaho Bay Area MeetupOverview of webSpoon @ Pentaho Bay Area Meetup
Overview of webSpoon @ Pentaho Bay Area Meetup
 
Your Inner Sysadmin - MidwestPHP 2015
Your Inner Sysadmin - MidwestPHP 2015Your Inner Sysadmin - MidwestPHP 2015
Your Inner Sysadmin - MidwestPHP 2015
 
Frontcon video
Frontcon videoFrontcon video
Frontcon video
 
Profiling and inspection with Blackfire.io
Profiling and inspection with Blackfire.ioProfiling and inspection with Blackfire.io
Profiling and inspection with Blackfire.io
 
eBPF Workshop
eBPF WorkshopeBPF Workshop
eBPF Workshop
 
Software Quality Assurance Tooling - Wintersession 2024
Software Quality Assurance Tooling - Wintersession 2024Software Quality Assurance Tooling - Wintersession 2024
Software Quality Assurance Tooling - Wintersession 2024
 
Intro to Strapi 4
Intro to Strapi 4Intro to Strapi 4
Intro to Strapi 4
 
Рабочие нагрузки Skype for business 2015 UC Lab
Рабочие нагрузки Skype for business 2015 UC LabРабочие нагрузки Skype for business 2015 UC Lab
Рабочие нагрузки Skype for business 2015 UC Lab
 

Kürzlich hochgeladen

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Kürzlich hochgeladen (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

HEYBE Toolkit Automates Pentesting

  • 1. HEYBE – Pentest Toolkit Bahtiyar Bircan bahtiyarb@gmail.com http://github.com/heybe BlackHat Arsenal USA 2015 – 6 August 2015
  • 2. 2 Pentesting Recap What is Heybe Toolkit? Flashlight Crowbar SeeS Network9 ( DepDep) Agenda BlackHat Arsenal USA – 2015
  • 3. Penetration Testing Recap 3BlackHat Arsenal USA – 2015
  • 4. Pentest Types 4 Internal Pentest External Pentest Web Application Tests Database Test Social Engineering DDoS Tests Active Directory Wifi Tests … BlackHat Arsenal USA – 2015
  • 5. Some Problems During Pentests 5 Very large networks Limited time Forgetting to save results Scan reports Screenshots Non standard Nmap parameters Non-standard nmap report names Bruteforce unusual applications BlackHat Arsenal USA – 2015
  • 7. What is HEYBE Toolkit 7BlackHat Arsenal USA – 2015 HEYBE is toolkit for everyday pentest usage Automates common test phases Provides standardized reports and outputs
  • 8. Developers 8 Gökhan Alkan  TUBITAK Cyber Security Institute  Email: cigalkan@gmail.com  Github: github.com/galkan  Twitter: @gokhan_alkn Bahtiyar Bircan  Barikat Akademi (www.barikatakademi.com.tr)  Email: bahtiyarb@gmail.com  Github: github.com/bahtiyarb  Twitter: @bahtiyarb BlackHat Arsenal USA – 2015
  • 9. WHY? 9 Automate and speed up boring/standard steps More time for fun like SE Standardize test results Save results for reporting BlackHat Arsenal USA – 2015
  • 11. HEYBE Toolkit 11 Code available on Github https://github.com/heybe https://github.com/galkan/flashlight https://github.com/galkan/crowbar https://github.com/galkan/sees https://github.com/galkan/depdep First published at Blackhat USA 2014 BlackHat Arsenal USA – 2015
  • 13. Penetration Test Phases – Heybe 13BlackHat Arsenal USA – 2015
  • 15. Flashlight (Fener) 15 Information Gathering & Recon Tool https://github.com/heybe/fener 3 Different Recon Methods Active Scan Passive Scan Screenshot Scan BlackHat Arsenal USA – 2015
  • 16. Flashlight (Fener) – Active Scan 16 Leverages Nmap for active port scanning Custom config file for scan parameters Ports NSE Scripts Save scan results with standard report name Multithreaded Nmap scans Ping Scan Service & OS Scan Script Scan BlackHat Arsenal USA – 2015
  • 17. Flashlight (Fener) – Passive Scan 17 Stealth network recon Passive traffic capture Arpspoof MitM support Traffic saved in pcap file Valuable information extracted from traffic Hosts Ports Windows hostnames Top 10 HTTP hosts Top 10 DNS domains BlackHat Arsenal USA – 2015
  • 18. Flashlight (Fener) – Screenshot Scan 18 Used to quickly discover web applications in network Save screenshots of discovered web apps Standard screenshot filenames Used for Offline examination Pentest report BlackHat Arsenal USA – 2015
  • 19. Flashlight (Fener) – Usage 19 Active Scan • ./flashlight.py -p 1 -s active -d 10.0.0.27 -v Screenshot Scan • ./flashlight.py -p 1 -s screen -d 10.0.0.27 -v Passive Scan • ./flashlight.py -p 1 -s passive -i eth1 -k 30 -g 10.0.0.10 -v Filter Results • ./flashlight.py -p 3 -s filter -f /root/Dump/dump4-browser.pcap -v BlackHat Arsenal USA – 2015
  • 20. Flashlight (Fener) – Demo Videos 20 Heybe - Flashlight Active Scan : • https://youtu.be/Li6skbC42C8 Heybe - Flashlight Filtering • https://youtu.be/9wft9zuh1f0 Heybe - Flashlight Passive Scan • https://youtu.be/98Soe01swR8 Heybe - Flashlight Screenshot Scan • https://youtu.be/qCgW-SfYl1c BlackHat Arsenal USA – 2015
  • 22. Crowbar 22 Brute Force Tool https://github.com/galkan/crowbar Supported protocols: OpenVPN Remote Desktop Protocol (with NLA support) SSH Private Key VNC Passwd Reporting Debug Logging BlackHat Arsenal USA – 2015
  • 23. Crowbar - Usage 23 Brute Force RDP Servers • ./crowbar.py -b rdp -s 10.0.0.14/32 -U users.txt -C pass.txt Brute Force OpenVPN • ./crowbar.py -b openvpn -s 10.0.0.29/32 -p 443 -m ovpn-config.ovpn -k ovpn-ca.crt -u test -c test –v Brute Force SSH Servers • ./crowbar.py -b sshkey -s 10.0.0.0/24 -k sshkeys/ -U users.txt -v -d Brute Force VNC • ./crowbar.py -b vnckey -s 192.168.2.105/32 -p 5902 -k /root/.vnc/passwd BlackHat Arsenal USA – 2015
  • 24. Crowbar – Demo Videos 24 Heybe - Crowbar OpenVPN Bruteforcing • https://youtu.be/4QZAWGsveSM Heybe - Crowbar RDP Bruteforcing • https://youtu.be/i_byBBlpZoE Heybe - Crowbar SSH Bruteforcing • https://youtu.be/IOSUpAFaL6E BlackHat Arsenal USA – 2015
  • 26. SeeS 26 Social Engineering Tool https://github.com/heybe/sees Send targeted SE mails in bulk HTML mail body Multiple attachment Local/Remote SMTP server support BlackHat Arsenal USA – 2015
  • 27. SeeS - Usage 27 Sending e-mail with html body • ./sees.py -c config/sees.cfg -m config/user.bbusa --text --html_file data/html.text_link -v Sending e-mail with attachments • ./sees.py -c config/sees.cfg -m config/user.bbusa --html_file data/html.text --attach data/sample.docx -v Demo video • https://youtu.be/6sNu8gJoT3k BlackHat Arsenal USA – 2015
  • 29. Network9 (DepDep) 29 Post-Exploitation Tool https://github.com/heybe/depdep Discover sensitive files in network shares Works with Windows SMB shares Can search sensitive information within file name and file contents BlackHat Arsenal USA – 2015
  • 30. Network9 (DepDep) - Usage 30 Discover sensitive files in windows shares • ./depdep.py -f config/depdep.xml -v 1 -w 1 Demo video • https://youtu.be/XxnU3C-pZSg BlackHat Arsenal USA – 2015
  • 32. Summary – Detailed 32BlackHat Arsenal USA – 2015
  • 33. Summary – Detailed 33BlackHat Arsenal USA – 2015
  • 34. Referenses  Source Code : • https://github.com/heybe • https://github.com/galkan/sees • https://github.com/galkan/depdep • https://github.com/galkan/sees • https://github.com/galkan/kacak • https://github.com/galkan/fener • https://github.com/galkan/crowbar  Youtube Demo Links : • Playlist https://www.youtube.com/playlist?list=PL1BVM6VWlmWZOv9Hv8TV2v-kAlUmvA5g7 • Heybe - Flashlight Active Scan : https://youtu.be/Li6skbC42C8 • Heybe - Flashlight Active Network Scan https://youtu.be/EUMKffaAxzs • Heybe - Flashlight Filtering https://youtu.be/9wft9zuh1f0 • Heybe - Flashlight Passive Scan https://youtu.be/98Soe01swR8 • Heybe - Flashlight Screenshot Scan https://youtu.be/qCgW-SfYl1c • Heybe - Crowbar OpenVPN Bruteforcing https://youtu.be/4QZAWGsveSM • Heybe - Crowbar RDP Bruteforcing https://youtu.be/i_byBBlpZoE • Heybe - Crowbar SSH Bruteforcing https://youtu.be/IOSUpAFaL6E • Heybe - Kacak https://youtu.be/ctP8QHDMYQM • Heybe - NetworK9 https://youtu.be/XxnU3C-pZSg • Heybe - SeeS Social Engineering Demo https://youtu.be/6sNu8gJoT3k 34
  • 35. BlackHat Arsenal USA – 6 August 2015 Bahtiyar Bircan bahtiyarb@gmail.com https://github.com/heybe