Class: Lacewing::Exploits
- Inherits:
-
Object
- Object
- Lacewing::Exploits
- Defined in:
- lib/lacewing/exploits.rb
Class Method Summary collapse
- .code_injection ⇒ Object
- .lfi ⇒ Object
- .rce ⇒ Object
- .reverse_shell ⇒ Object
- .sqli ⇒ Object
- .xss ⇒ Object
Class Method Details
.code_injection ⇒ Object
68 69 70 71 72 73 74 75 76 77 78 79 80 |
# File 'lib/lacewing/exploits.rb', line 68 def self.code_injection puts 'Code Injection - An attack to inject code into a vulnerable computer program to change the course of execution.'.bold.green puts Lacewing::PROMPT + 'Here are some references for different kinds of code injection vulnerabilities' ref = [ 'Shell Injection - https://en.wikipedia.org/wiki/Code_injection#Shell_injection', 'HTML Injection - https://en.wikipedia.org/wiki/Code_injection#HTML_script_injection', 'https://en.wikipedia.org/wiki/Code_injection#Object_injection' ] ref.each { |i| puts "\t#{i}" } puts 'Press any key to continue...'.bold.green return if STDIN.getch end |
.lfi ⇒ Object
6 7 8 9 10 11 12 13 14 15 16 17 18 |
# File 'lib/lacewing/exploits.rb', line 6 def self.lfi puts 'LFI: Local File Inclusion'.bold.green puts Lacewing::PROMPT + 'Here are a few articles on how to test LFI:' places = ['https://www.owasp.org/index.php/Testing_for_Local_File_Inclusion', 'https://www.offensive-security.com/metasploit-unleashed/file-inclusion-vulnerabilities/'] places.each { |i| puts "\t#{i}"} puts Lacewing::PROMPT + 'Here are some common payloads:' payloads = %w[../../../../etc/passwd ../../../../etc/shadow ../../../../var/mail/root] payloads.each { |i| puts "\t#{i}" } puts 'Press any key to continue... '.bold.green return if STDIN.getch end |
.rce ⇒ Object
20 21 22 23 24 25 26 27 28 29 30 31 32 |
# File 'lib/lacewing/exploits.rb', line 20 def self.rce puts 'RCE: Remote Code Execution'.bold.green puts Lacewing::PROMPT + 'There\'s a lot of different kinds of RCE, so here are some examples:' examples = %w[https://thehackernews.com/2018/04/windows-patch-updates.html https://www.symantec.com/security_response/vulnerability.jsp?bid=102375 https://en.wikipedia.org/wiki/EternalBlue] examples.each { |i| puts "\t#{i}" } puts Lacewing::PROMPT + 'Here are some tools to use:' tools = ['Metasploit Framework - metasploit.com', 'Golismero - golismero-project.com/'] tools.each { |i| puts "\t#{i}"} puts 'Press any key to continue... '.bold.green return if STDIN.getch end |
.reverse_shell ⇒ Object
82 83 84 85 86 87 88 89 90 91 92 93 94 |
# File 'lib/lacewing/exploits.rb', line 82 def self.reverse_shell puts 'Reverse Shell - The act of redirecting the input and output of a shell to a service so that it can be remotely accessed'.bold.green puts Lacewing::PROMPT + "If you've found some sort of code injection vulnerability, you can use a reverse shell to get full access" puts Lacewing::PROMPT + 'Here are a few great tools to exploit a reverse shell:' tools = [ 'Shell.now - https://shell.now.sh/', 'Metasploit - https://metasploit.com', 'Turtle - https://github.com/buckyroberts/Turtle' ] tools.each { |i| puts "\t#{i}" } puts 'Press any key to continue...'.bold.green return if STDIN.getch end |
.sqli ⇒ Object
96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 |
# File 'lib/lacewing/exploits.rb', line 96 def self.sqli puts 'SQL Injection - An attack in which nefarious SQL statements are inserted into an entry field for execution'.bold.green puts Lacewing::PROMPT + 'Here are some tools for exploiting SQL injections:' tools = [ 'SQLMap - https://github.com/sqlmapproject/sqlmap', 'BBQSQL - https://github.com/Neohapsis/bbqsql/', 'SQLNinja - https://github.com/xxgrunge/sqlninja' ] tools.each { |i| puts "\t#{i}" } puts Lacewing::PROMPT + 'Here are some articles on SQL Injection:' ref = [ 'https://en.wikipedia.org/wiki/SQL_injection', 'https://technet.microsoft.com/en-us/library/ms161953(v=sql.105).aspx', 'https://www.veracode.com/security/sql-injection' ] ref.each { |i| puts "\t#{i}" } puts 'Press any key to continue...'.bold.green return if STDIN.getch end |
.xss ⇒ Object
34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 |
# File 'lib/lacewing/exploits.rb', line 34 def self.xss puts 'XSS: Cross-Site Scripting'.bold.green xss_types = ['Reflected - Specially crafted input returned back to user', 'Stored - Permanent Injection', 'DOM-based - XSS artifact as an HTML DOM'] type = $prompt.select('There are different kinds of XSS attacks. Which one do you want?', xss_types) case type when xss_types[0] ref = [ 'https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OWASP-DV-001)', 'https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet', 'https://security.stackexchange.com/questions/65142/what-is-reflected-xss' ] puts Lacewing::PROMPT + 'Here are some references to Reflected XSS:' ref.each { |i| puts "\t#{i}" } when xss_types[1] ref = [ 'https://www.incapsula.com/web-application-security/cross-site-scripting-xss-attacks.html', 'https://www.hackingloops.com/what-is-stored-cross-site-scripting-or-stored-xss/', 'https://www.acunetix.com/websitesecurity/xss/' ] puts Lacewing::PROMPT + 'Here are some references for Stored XSS' ref.each { |i| puts "\t#{i}" } when xss_types[2] ref = [ 'https://www.owasp.org/index.php/DOM_Based_XSS', 'https://www.netsparker.com/blog/web-security/dom-based-cross-site-scripting-vulnerability/', 'https://en.wikipedia.org/wiki/Cross-site_scripting#Server-side_versus_DOM-based_vulnerabilities' ] puts Lacewing::PROMPT + 'Here are some references for DOM-based XSS' ref.each { |i| puts "\t#{i}" } end puts 'Press any key to continue... '.bold.green return if STDIN.getch end |