-
Notifications
You must be signed in to change notification settings - Fork 148
Tools
Information Gathering is a key part of many types of hacking including penetration testing and social engineering. Before starting anything you must do recon and gather info about your target(s). The following tools will help with those steps. [Not all tools have been implemented yet. Only working and included tools will be displayed here.]
Nmap is a recon tool used for scanning networks for open ports and addresses. It is a very powerful tool that can be used from the command line. The Nmap tool uses this command line tool which is required. Following installation instructions will allow you to use this. If you are using Kali you will already have the tool installed.
The nmap tool in BabySploit will create a command line query and run it for you. Below shows the types of nmap scans you can perform with this tool:
When first running nmap
in BabySploit you will be prompted to enter a Host/Host Range. If you are scanning an entire network use a gateway and CIDR number like the screenshot shows (Gateway will most likely be 10.0.0.0
or 192.168.<0/1>.1
). You can find your gateway by running ifconfig from the command line.
For more info on scans visit here or here
The IP Lookup tool will allow you to enter any IP or Domain and run a scan to show Location, IP, and ISP. Below shows a test on google.com.
The DNS Lookup tool will allow you to enter any IP or Domain and run a scan to show DNS Records for that IP. Below shows a test on google.com.
Exploitation is the part of hacking that occurs once you have found a vulnerability to attack. You can exploit anything with the right vulnerability and these tools will help you find an exploit for a vuln you have.
Searchsploit is a program that searches the exploitdb for available exploits. You can search by platform and with any keywords. Run searchsploit
to find exploits. Below is an example search.
This Wiki Page Is Not Finished!