The Wayback Machine - https://web.archive.org/web/20201227033958/https://github.com/RokasUrbelis/System-security-testing
Skip to content
master
Go to file
Code

Latest commit

 

Git stats

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
 
 
 
 
 
 
 
 
 
 
 
 

README.md

System security test

Before this

  • Support port service brute and target scanning (compatible with Debian/Centos/Ubuntu/Kali/Mint,if you use the docker container run the script,then compatible with all linux distros)

Hereby certify:

  • There is no purpose in writing this script, just for the convenience of security testers and improve system security, there is no mercy in the battlefield, if you pick up the hands of weapons, you will make a terrible mistake.
  • The author is not responsible for any legal consequences arising out of the user's use of this script.
  • Container operation mode the root directory of the cabin user.txt and password.txt two files, also you can use a custom dictionary by yourself

The following two methods of security testing are supported

  • nmap

    • 1.Service and port scanning
    • 2.OS identification
    • 3.Specifies a port or port range to scanning
    • 4.Vulnerability scanning
    • 5.WHOIS query
    • 6.Probes all online hosts in a specified network segment
    • 7.Host batch scanning
    • 8.Call any nmap scripts to scanning
  • hydra

    • 1.SSH brute
    • 2.Redesktop brute
    • 3.FTP brute
    • 4.Telnet brute
    • 5.MySql brute
    • 6.Smb brute
    • 7.Mssql brute
    • 8.Other protocol brute

There are currently several supported protocols:

asterisk cvs cisco-enable firebird ftp ftps icq imap irc ldap2 nntp mssql mysql oracle-sid pcanywhere pcnfs pop3 rdp postgres radmin2 rexec rlogin rpcap rtsp sip smb smtp smtp-enum socks5 ssh sshkey svn teamspeak vnc xmpp

Run

git:

git clone https://github.com/RokasUrbelis/system_security_testing.git 
cd crack
bash crack.sh

curl:

bash -c "$(curl -fsSl https://blog.linux-code.com/scripts/crack.sh)"

docker container:

docker run -ti --name crack sebastion/crack:1.0 crack.sh

enter the container:

docker run -ti -d --name crack1 sebastion/crack:1.0 /bin/bash
docker exec -ti $(awk '{FS="[ ]+"}{if(NR==2){print $1}}'< <(docker ps -l)) /bin/bash
bash crack.sh

temporary container run:

docker run --rm -ti sebastion/crack:1.0 /crack.sh

Use Dockerfile to build the image and run the container:

git clone https://github.com/RokasUrbelis/system_safety_test.git
cd system_safety_test
docker build -t crack:1.0 .
docker run --ti --rm crack:1.0

Follow Me

  • Email: Rokas.Yang@gmail.com
  • QICQ :1798996632
  • And Blog😊(Subscribe to our RSS feed for more technical articles)

About

🐧🔥System security testing tools(compatible with Debian/Centos/Ubuntu/Kali/Mint,use the nmap and hydra security testing tools)

Topics

Resources

Packages

No packages published
You can’t perform that action at this time.