sparta: python gui used to automate secondary tools. can run some nse scripts, launch dirburster/nikto, etc. can import but not export nmap xml. cannot run specific nmap scripts yet without editing conf file. the secforce guys are pretty good at responding
- controller.py - main python framework
- sparta.conf
- nikto.
- consider removing it from staged scan if scanning many hosts: delete the nikto line from under [SchedulerSettings]
- snmpcheck. it appears snmpcheck does not work under kali sana. try:
- #sudo gem install snmp to add the required ruby gem. or:
- grab the new version from nothink (or older python version), chmod and drop it in /usr/bin/ without the file extension
- update .conf (see below)
- nmap script categories
- add to [HostActions] to run independently if required
- nmap-nsed-tcp=Run nmap NSE default, "nmap --script default [IP] -oA \"[OUTPUT]\""
- nmap-nsev-tcp=Run nmap NSE vuln, "nmap --script vuln [IP] -oA \"[OUTPUT]\""
- nmap-nseb-tcp=Run nmap NSE brute, "nmap --script brute [IP] -oA \"[OUTPUT]\""
- nmap-nsee-tcp=Run nmap NSE exploit, "nmap --script exploit [IP] -oA \"[OUTPUT]\""
- add to [PortActions]
- snmpcheck. snmpcheck=Run snmpcheck, "snmpcheck [IP] -p [PORT]", snmp
- samrdump. update to samrdump=Run samrdump, python /usr/share/doc/python-impacket/examples/samrdump.py [IP] [PORT]/SMB, "netbios-ssn,microsoft-ds"
- smbclient. update .conf to smbclient=Connect with smbclient, "smbclient -NL [IP] -p[PORT]", "netbios-ssn,microsoft-ds"
- dns on isolated network.
- add port 53 (DNS) to stage1's scanned ports (this quickly finds a local dns server)
- add local dns resoution to sparta's database (adds hostnames next to ip addresses).
- find the dns server and verify it resolves hostnames
- add command under [HostAction]. [PortActions] works but sparta does not add the results to the database.
- nmap-dns-tcp=Run nmap (dns resolve tcp), nmap -f [IP] --dns-servers <dns server ip> -oA \"[OUTPUT]\"
- works for one dns server. check nmap's manual to resolve against multiple servers
- gobuster
- useful to brute force directories
- gobuster=Launch gobuster, gobuster -w /directory/to/wordlist.txt -u [IP]:[PORT], "http,https,ssl,soap,http-proxy,http-alt