这是关于内网渗透的一些资料和工具
立即下载
资源介绍:
关于内网渗透的工具和资料
reGeorg
=========
``` _____
_____ ______ __|___ |__ ______ _____ _____ ______
| | | ___|| ___| || ___|/ \| | | ___|
| \ | ___|| | | || ___|| || \ | | |
|__|\__\|______||______| __||______|\_____/|__|\__\|______|
|_____|
... every office needs a tool like Georg
```
willem@sensepost.com / [@\_w\_m\_\_]
sam@sensepost.com / [@trowalts]
etienne@sensepost.com / [@kamp_staaldraad]
Version
----
1.0
Dependencies
-----------
reGeorg requires Python 2.7 and the following modules:
* [urllib3] - HTTP library with thread-safe connection pooling, file post, and more.
Usage
--------------
```
$ reGeorgSocksProxy.py [-h] [-l] [-p] [-r] -u [-v]
Socks server for reGeorg HTTP(s) tunneller
optional arguments:
-h, --help show this help message and exit
-l , --listen-on The default listening address
-p , --listen-port The default listening port
-r , --read-buff Local read buffer, max data to be sent per POST
-u , --url The url containing the tunnel script
-v , --verbose Verbose output[INFO|DEBUG]
```
* **Step 1.**
Upload tunnel.(aspx|ashx|jsp|php) to a webserver (How you do that is up to
you)
* **Step 2.**
Configure you tools to use a socks proxy, use the ip address and port you
specified when
you started the reGeorgSocksProxy.py
** Note, if you tools, such as NMap doesn't support socks proxies, use
[proxychains] (see wiki)
* **Step 3.** Hack the planet :)
Example
---------
```
$ python reGeorgSocksProxy.py -p 8080 -u http://upload.sensepost.net:8080/tunnel/tunnel.jsp
```
License
----
MIT
[@\_w\_m\_\_]:http://twitter.com/_w_m__
[@trowalts]:http://twitter.com/trowalts
[@kamp_staaldraad]:http://twitter.com/kamp_staaldraad
[urllib3]:https://pypi.python.org/pypi/urllib3
[proxychains]:http://sourceforge.net/projects/proxychains/
资源文件列表:
文档与工具.zip 大约有162个文件