APT2 自动化渗透测试工具包

该工具将执行NMap的扫描,或从Nexpose,Nessus,或NMap的扫描结果导入。该processesd结果将被用于发送到根据安全测试配置的枚举模块中。

所有模块的结果存储在本地主机上,并为APT2知识库(KB)的一部分。知识库可从应用程序中访问,并允许用户观看一个利用模块的具体结果。

 

 

-----------------------

 

LIST OF CURRENT MODULES

-----------------------

nmaploadxml Load NMap XML File

hydrasmbpassword Attempt to bruteforce SMB passwords

nullsessionrpcclient Test for NULL Session

msf_snmpenumshares Enumerate SMB Shares via LanManager OID Values

nmapbasescan Standard NMap Scan

impacketsecretsdump Test for NULL Session

msf_dumphashes Gather hashes from MSF Sessions

msf_smbuserenum Get List of Users From SMB

anonftp Test for Anonymous FTP

searchnfsshare Search files on NFS Shares

crackPasswordHashJohnTR Attempt to crack any password hashes

msf_vncnoneauth Detect VNC Services with the None authentication type

nmapsslscan NMap SSL Scan

nmapsmbsigning NMap SMB-Signing Scan

responder Run Responder and watch for hashes

msf_openx11 Attempt Login To Open X11 Service

nmapvncbrute NMap VNC Brute Scan

msf_gathersessioninfo Get Info about any new sessions

nmapsmbshares NMap SMB Share Scan

userenumrpcclient Get List of Users From SMB

httpscreenshot Get Screen Shot of Web Pages

httpserverversion Get HTTP Server Version

nullsessionsmbclient Test for NULL Session

openx11 Attempt Login To Open X11 Servicei and Get Screenshot

msf_snmplogin Attempt Login Using Common Community Strings

msf_snmpenumusers Enumerate Local User Accounts Using LanManager/psProcessUsername OID Values

httpoptions Get HTTP Options

nmapnfsshares NMap NFS Share Scan

msf_javarmi Attempt to Exploit A Java RMI Service

anonldap Test for Anonymous LDAP Searches

ssltestsslserver Determine SSL protocols and ciphers

gethostname Determine the hostname for each IP

sslsslscan Determine SSL protocols and ciphers

nmapms08067scan NMap MS08-067 Scan

msf_ms08_067 Attempt to exploit MS08-067