Skip to content

Commit d48a1fe

Browse files
author
Fernando Fernández
committed
Add information on README file.
Signed-off-by: Fernando Fernández <[email protected]>
1 parent fcbe8d9 commit d48a1fe

File tree

1 file changed

+23
-2
lines changed

1 file changed

+23
-2
lines changed

README.md

+23-2
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,9 @@ Well, now you are ready to use the script, so enjoy it!
2020

2121
## DNS record query
2222

23+
**Usage**: `$ python3 pentesting-multitool.py -d <domain> -r <record>`
24+
**Options**: `-f <filename>`
25+
2326
**Warning**: _Not all DNS records are implemented so check on this table what DNS records are available._
2427

2528
| RECORDS | STATUS |
@@ -35,20 +38,31 @@ Well, now you are ready to use the script, so enjoy it!
3538

3639
## Whois function
3740

38-
The whois function generates a dictionary with the information but I recommend to check the availability of the keys for the specified domain, anyway if the key isn't available an error message will be shown.
41+
**Usage**: `$ python3 pentesting-multitool.py -w <domain>`
42+
**Options**: `-f <filename>`
43+
44+
The whois function generates a dictionary with the information, you can write the information on a file with the -f option or print it.
3945

4046
Sometimes the information is hidden so keep that possibility in mind.
4147

4248
## Shodan search function
4349

50+
**Usage**: `$ python3 pentesting-multitool.py -s <search query>`
51+
**Options**: `-f <filename>, -u(full information flag)`
52+
53+
_Note: If **-u** flag is set, you will get full information about the devices or services found. Otherwise, you will get only the IP._
54+
4455
The Shodan search function (ssearch) uses the Shodan external library in order to integrate Shodan browser in our script.
4556

4657
The script implements a "simple search"(is simple as you want), for the search query parameters we will put exactly the same that if we were searching using Shodan website but with the filters separated by "-" here is an example of search query:
4758

48-
```"ip:8.8.8.0/24-ports:22"```
59+
`"ip:8.8.8.0/24-ports:22"`
4960

5061
## Banner grabbing function
5162

63+
**Usage**: `# python3 pentesting-multitool.py -b <ip> -p <ports>`
64+
**Options**: `-f <filename>`
65+
5266
The banner grabbing function first creates a socket with the specified IP and port, so we can use a list of ports (separated by `:`).
5367

5468
**Warning**: _Not all services are implemented so check on this table what service is available._
@@ -64,18 +78,25 @@ The banner grabbing function first creates a socket with the specified IP and po
6478

6579
## Flooding using PCAP function
6680

81+
**Usage**: `# python3 pentesting-multitool.py -o <number of sends or packets(generator mode)> -f <pcap filename>`
82+
**Options**: `-g (Generator mode flag)`
83+
6784
The flooding function have two options. The first option is the generator mode that creates a PCAP file with a specified amount of packets and name. Those packets have two layers IP and ICMP (Echo request).
6885

6986
For the flood mode, using TCPReplay, we will send the list of packets included on the PCAP file in a loop of _n_ iterations. It's recommended to add 200 packets to the file for DOS Attack and 100 packets to generate latency increase but that varies between networks and AP's.
7087

7188
## Fuzzing function
7289

90+
**Usage**: `# python3 pentesting-multitool.py -z <target ip> -ng <number of generations> -n <number of packets> -l <Layer(UDP, TCP, ICMP)> -f <pcap filename>`
91+
7392
The fuzzing function will generate a number of random packets with UDP, TCP or ICMP layer as indicated by the user, _n_ times (number of generations parameter). After sending the packet it will wait for a response one second, if there is no response then a default packet will be created. All packets will be stored in a PCAP afterwards, where the first packet is the sent packet and the second one is the response of this packet.
7493

7594
Also, is obvius that you have to set the target IP because it useless to set it by using Scapy RandIP function.
7695

7796
## Man-in-the-Middle function
7897

98+
**Usage**: `# python3 pentesting-multitool.py -m <interface> -v <victim IP> -a <AP Gateway>`
99+
79100
Well, first I want to clarify that it is not a tool designed to attack, it is a tool to check if our network is vulnerable to a mitm scheme attack using ARP Spoofing.
80101

81102
Using ARP Spoofing we indicate to the router that the victim's IP is in our MAC Address and at the same time we indicate to the victim that the gateway's IP address is in our MAC address so we are intercepting all the traffic between the victim and the router.

0 commit comments

Comments
 (0)