Files
Diablo/README.md
Aภl๏miuภuຮ a03da94f41 Update README.md
2022-05-23 17:09:17 +03:00

98 lines
2.8 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
<div align="center">
# [Diablo](https://github.com/Anlominus/Diablo)
Diablo ~ Hacking / Pentesting Tools
<img width="801" alt="image" src="https://user-images.githubusercontent.com/51442719/169661091-5ed6585d-2be0-4706-b3e5-899536e6ca0d.png">
</div>
# 📜 Menu / To Do
- [ ] [a] - Anonymity Surfing
- [ ] [1] - Planning and Scoping
- [x] [2] - Reconnaissance & Vulnerability Assessment
- [ ] [3] - Gaining Access & Maintaining Access
- [ ] [4] - Covering tracks
- [x] [5] - Analysis & Reporting
┌──[ Anlominus 👽 Diablo $~]
└──╼
# Features
- [ ] [2] - Reconnaissance & Vulnerability Assessment
- Scan URL/IP and Report
- [x] ping
- [x] nmap
- [x] dig
- [x] nslookup
- [x] whois
---
<details>
<summary>
1) Steps Example
</summary>
# Reconnaissance
- The observation stage:
- attackers typically assess the situation from the outside-in, in order to identify both targets and tactics for the attack.
# Intrusion
- Based on what the attackers discovered in the reconnaissance phase, theyre able to get into your systems:
- often leveraging malware or security vulnerabilities.
# Exploitation
- The act of exploiting vulnerabilities, and delivering malicious code onto the system, in order to get a better foothold.
# Privilege Escalation
- Attackers often need more privileges on a system to get access to more data and permissions:
- for this, they need to escalate their privileges often to an Admin.
# Lateral Movement
- Once theyre in the system, attackers can move laterally to other systems and accounts in order to gain more leverage:
- whether thats higher permissions, more data, or greater access to systems.
# Obfuscation / Anti-forensics
- In order to successfully pull off a cyberattack, attackers need to cover their tracks, and in this stage they often lay false trails, compromise data, and clear logs to confuse and/or slow down any forensics team.
# Denial of Service
- Disruption of normal access for users and systems, in order to stop the attack from being monitored, tracked, or blocked
# Exfiltration
- The extraction stage:
- getting data out of the compromised system.
</details>
---
<details>
<summary align="center">
<h4> Sources </h4>
</summary>
- Inspirational tools
- as Anonymity Surfing
- pl Planning
- sv Scanning Vulnerability
- ga Gaining Access
- ma Maintaining Access
- ct Covering tracks
- an Analysis
- rp Reporting
- [PeTeReport](https://github.com/1modm/petereport)
- [PwnDoc](https://github.com/pwndoc/pwndoc)
- Tools:
- [HacKing](https://github.com/Anlominus/HacKing)
- [PenTest](https://github.com/Anlominus/PenTest)
- [LALIN](https://github.com/screetsec/LALIN)
- Cheat Sheets:
- [CheatSheets](https://github.com/Anlominus/CheatSheets)
</details>