Skip to content
macsdev edited this page Nov 11, 2018 · 1 revision

Information Gathering:

Information Gathering is a key part of many types of hacking including penetration testing and social engineering. Before starting anything you must do recon and gather info about your target(s). The following tools will help with those steps. [Not all tools have been implemented yet. Only working and included tools will be displayed here.]

Nmap

Nmap is a recon tool used for scanning networks for open ports and addresses. It is a very powerful tool that can be used from the command line. The Nmap tool uses this command line tool which is required. Following installation instructions will allow you to use this. If you are using Kali you will already have the tool installed.

The nmap tool in BabySploit will create a command line query and run it for you. Below shows the types of nmap scans you can perform with this tool:

nmap

When first running nmap in BabySploit you will be prompted to enter a Host/Host Range. If you are scanning an entire network use a gateway and CIDR number like the screenshot shows (Gateway will most likely be 10.0.0.0 or 192.168.<0/1>.1). You can find your gateway by running ifconfig from the command line.

For more info on scans visit here or here

IP Lookup

The IP Lookup tool will allow you to enter any IP or Domain and run a scan to show Location, IP, and ISP. Below shows a test on google.com.

iplookup

DNS Lookup

The DNS Lookup tool will allow you to enter any IP or Domain and run a scan to show DNS Records for that IP. Below shows a test on google.com.

dnslookup

Exploitation

Exploitation is the part of hacking that occurs once you have found a vulnerability to attack. You can exploit anything with the right vulnerability and these tools will help you find an exploit for a vuln you have.

Searchsploit

Searchsploit is a program that searches the exploitdb for available exploits. You can search by platform and with any keywords. Run searchsploit to find exploits. Below is an example search.

searchsploit
This Wiki Page Is Not Finished!

Clone this wiki locally