Skip to content

Commit 7d58480

Browse files
committed
refactor(refactor): refactor de credentials de evilwinrm de psexec, find \n\n Version: release/0.1.52 \n\n new commands cve documented COMMANDS.md \n\n Modified file(s):\n- COMMANDS.md
- README.md - UTILS.md - docs/COMMANDS.html - docs/README.html - docs/UTILS.html - docs/index.html - docs/index.html.bak - lazyown - payload.json - sessions/download_resources.sh - utils.py\n LazyOwn on HackTheBox: https://app.hackthebox.com/teams/overview/6429 \n\n LazyOwn/ https://grisuno.github.io/LazyOwn/ \n\n \n\n Fecha: Wed Oct 2 00:57:56 2024 -0300 \n\n Hora: 1727841476
1 parent c05394a commit 7d58480

File tree

14 files changed

+2986
-2646
lines changed

14 files changed

+2986
-2646
lines changed

CHANGELOG.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,13 @@
22
# Changelog
33

44

5+
### Refactorización
6+
7+
### Otros
8+
9+
* * refactor(refactor): refactor de credentials de evilwinrm de psexec, find \n\n Version: release/0.1.52 \n\n new commands cve documented COMMANDS.md \n\n Modified file(s):\n- COMMANDS.md - README.md - UTILS.md - docs/COMMANDS.html - docs/README.html - docs/UTILS.html - docs/index.html - docs/index.html.bak - lazyown - payload.json - sessions/download_resources.sh - utils.py\n LazyOwn on HackTheBox: https://app.hackthebox.com/teams/overview/6429 \n\n LazyOwn/ https://grisuno.github.io/LazyOwn/ \n\n \n\n Fecha: Wed Oct 2 00:57:56 2024 -0300 \n\n Hora: 1727841476
10+
11+
512
### Nuevas características
613

714
### Otros

COMMANDS.md

Lines changed: 28 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1413,23 +1413,22 @@ To manually run this command, use the following syntax:
14131413
Replace `<domain>` with the actual domain name you want to query.
14141414

14151415
## psexec
1416-
Copies the `rhost` IP address to the clipboard and updates the prompt with the IP address.
1416+
Executes the Impacket PSExec tool to attempt remote execution on the specified target.
14171417

1418-
1. Retrieves the `rhost` IP address from the `self.params` parameter.
1419-
2. Checks if the `rhost` is valid using `check_rhost()`. If invalid, the function returns without making changes.
1420-
3. If `line` is 'clean', resets the custom prompt to its original state.
1421-
4. Otherwise, updates the prompt to include the `rhost` IP address in the specified format.
1422-
5. Copies the `rhost` IP address to the clipboard using `xclip`.
1423-
6. Prints a message confirming that the IP address has been copied to the clipboard.
1418+
This function performs the following actions:
1419+
1. Checks if the provided target host (`rhost`) is valid.
1420+
2. If the `line` argument is "pass", it searches for credential files with the pattern `credentials*.txt`
1421+
and allows the user to select which file to use for executing the command.
1422+
3. If the `line` argument is not "pass", it assumes execution without a password (using the current credentials).
1423+
4. Copies the `rhost` IP address to the clipboard for ease of use.
14241424

1425-
:param line: This parameter determines whether the prompt should be reset or updated with the IP address.
1426-
:type line: str
1427-
:returns: None
1425+
Parameters:
1426+
line (str): A command argument to determine the action.
1427+
If "pass", the function searches for credential files and authenticates using the selected file.
1428+
Otherwise, it executes PSExec without a password using the `rhost` IP.
14281429

1429-
Manual execution:
1430-
To manually run this command, use the following syntax:
1431-
rhost <line>
1432-
Replace `<line>` with 'clean' to reset the prompt, or any other string to update the prompt with the IP address.
1430+
Returns:
1431+
None
14331432

14341433
## rpcdump
14351434
Executes the `rpcdump.py` script to dump RPC services from a target host.
@@ -2201,7 +2200,8 @@ Creates a `credentials.txt` file in the `sessions` directory with the specified
22012200

22022201
This function performs the following actions:
22032202
1. Validates the input line to ensure it contains a colon (`:`), indicating the presence of both a username and password.
2204-
2. Writes the valid input to `sessions/credentials.txt`.
2203+
2. Backs up the existing `credentials.txt` file if it exists, renaming it to `credentials_{username}.txt` based on the existing username.
2204+
3. Writes the valid input to `sessions/credentials.txt`.
22052205

22062206
Usage:
22072207
createcredentials user:password
@@ -5009,12 +5009,13 @@ Executes the Evil-WinRM tool to attempt authentication against the specified tar
50095009

50105010
This function performs the following actions:
50115011
1. Checks if the provided target host (`rhost`) is valid.
5012-
2. If the `line` argument is "pass", it reads credentials from the `credentials.txt` file and attempts authentication for each user-password pair using Evil-WinRM.
5012+
2. If the `line` argument is "pass", it searches for credential files with the pattern `credentials*.txt`
5013+
and allows the user to select which file to use for executing the command.
50135014
3. If `line` is not "pass", it prints an error message indicating the correct usage.
50145015

50155016
Parameters:
5016-
line (str): A command argument to determine the action.
5017-
If "pass", the function reads credentials from the `credentials.txt` file and attempts to authenticate.
5017+
line (str): A command argument to determine the action.
5018+
If "pass", the function searches for credential files and authenticates using the selected file.
50185019
If not "pass", it prints an error message with usage instructions.
50195020

50205021
Returns:
@@ -5594,6 +5595,15 @@ This function performs the following tasks:
55945595
:type line: str
55955596
:returns: None
55965597

5598+
## cve
5599+
Search for a CVE using the CIRCL API.
5600+
5601+
This function sends a GET request to the CIRCL API to retrieve CVE details
5602+
and prints relevant information to the screen.
5603+
5604+
:param line: A string containing the CVE ID (optional).
5605+
:returns: None
5606+
55975607
## find_tgts
55985608
Finds and returns a list of target hosts with port 445 open in the specified subnet.
55995609

README.md

Lines changed: 48 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1274,6 +1274,19 @@ and stderr) in a variable. If interrupted, the process is terminated gracefully.
12741274
Example:
12751275
To execute a command, call `run_command("ls -l")`.
12761276
1277+
## generate_random_cve_id
1278+
No description available.
1279+
1280+
## get_credentials
1281+
Searches for credential files with the pattern 'credentials*.txt' and allows the user to select one.
1282+
1283+
The function lists all matching files and prompts the user to select one. It then reads the selected file
1284+
and returns a list of tuples with the format (username, password) for each line in the file.
1285+
1286+
Returns:
1287+
list of tuples: A list containing tuples with (username, password) for each credential found in the file.
1288+
If no files are found or an invalid selection is made, an empty list is returned.
1289+
12771290
## wrapper
12781291
internal wrapper of internal function to implement multiples rhost to operate.
12791292
@@ -2695,23 +2708,22 @@ To manually run this command, use the following syntax:
26952708
Replace `<domain>` with the actual domain name you want to query.
26962709
26972710
## psexec
2698-
Copies the `rhost` IP address to the clipboard and updates the prompt with the IP address.
2711+
Executes the Impacket PSExec tool to attempt remote execution on the specified target.
26992712
2700-
1. Retrieves the `rhost` IP address from the `self.params` parameter.
2701-
2. Checks if the `rhost` is valid using `check_rhost()`. If invalid, the function returns without making changes.
2702-
3. If `line` is 'clean', resets the custom prompt to its original state.
2703-
4. Otherwise, updates the prompt to include the `rhost` IP address in the specified format.
2704-
5. Copies the `rhost` IP address to the clipboard using `xclip`.
2705-
6. Prints a message confirming that the IP address has been copied to the clipboard.
2713+
This function performs the following actions:
2714+
1. Checks if the provided target host (`rhost`) is valid.
2715+
2. If the `line` argument is "pass", it searches for credential files with the pattern `credentials*.txt`
2716+
and allows the user to select which file to use for executing the command.
2717+
3. If the `line` argument is not "pass", it assumes execution without a password (using the current credentials).
2718+
4. Copies the `rhost` IP address to the clipboard for ease of use.
27062719
2707-
:param line: This parameter determines whether the prompt should be reset or updated with the IP address.
2708-
:type line: str
2709-
:returns: None
2720+
Parameters:
2721+
line (str): A command argument to determine the action.
2722+
If "pass", the function searches for credential files and authenticates using the selected file.
2723+
Otherwise, it executes PSExec without a password using the `rhost` IP.
27102724
2711-
Manual execution:
2712-
To manually run this command, use the following syntax:
2713-
rhost <line>
2714-
Replace `<line>` with 'clean' to reset the prompt, or any other string to update the prompt with the IP address.
2725+
Returns:
2726+
None
27152727
27162728
## rpcdump
27172729
Executes the `rpcdump.py` script to dump RPC services from a target host.
@@ -3483,7 +3495,8 @@ Creates a `credentials.txt` file in the `sessions` directory with the specified
34833495
34843496
This function performs the following actions:
34853497
1. Validates the input line to ensure it contains a colon (`:`), indicating the presence of both a username and password.
3486-
2. Writes the valid input to `sessions/credentials.txt`.
3498+
2. Backs up the existing `credentials.txt` file if it exists, renaming it to `credentials_{username}.txt` based on the existing username.
3499+
3. Writes the valid input to `sessions/credentials.txt`.
34873500
34883501
Usage:
34893502
createcredentials user:password
@@ -6291,12 +6304,13 @@ Executes the Evil-WinRM tool to attempt authentication against the specified tar
62916304
62926305
This function performs the following actions:
62936306
1. Checks if the provided target host (`rhost`) is valid.
6294-
2. If the `line` argument is "pass", it reads credentials from the `credentials.txt` file and attempts authentication for each user-password pair using Evil-WinRM.
6307+
2. If the `line` argument is "pass", it searches for credential files with the pattern `credentials*.txt`
6308+
and allows the user to select which file to use for executing the command.
62956309
3. If `line` is not "pass", it prints an error message indicating the correct usage.
62966310
62976311
Parameters:
6298-
line (str): A command argument to determine the action.
6299-
If "pass", the function reads credentials from the `credentials.txt` file and attempts to authenticate.
6312+
line (str): A command argument to determine the action.
6313+
If "pass", the function searches for credential files and authenticates using the selected file.
63006314
If not "pass", it prints an error message with usage instructions.
63016315
63026316
Returns:
@@ -6876,6 +6890,15 @@ This function performs the following tasks:
68766890
:type line: str
68776891
:returns: None
68786892
6893+
## cve
6894+
Search for a CVE using the CIRCL API.
6895+
6896+
This function sends a GET request to the CIRCL API to retrieve CVE details
6897+
and prints relevant information to the screen.
6898+
6899+
:param line: A string containing the CVE ID (optional).
6900+
:returns: None
6901+
68796902
## find_tgts
68806903
Finds and returns a list of target hosts with port 445 open in the specified subnet.
68816904
@@ -7095,6 +7118,13 @@ Helper function to alternate the case of characters in a string.
70957118
# Changelog
70967119
70977120
7121+
### Nuevas características
7122+
7123+
### Otros
7124+
7125+
* * feat(feat): eternalblue \n\n Version: release/0.1.52 \n\n and scanner in pwntomate tool alias pyautomate coomand \n\n Modified file(s):\n- COMMANDS.md - README.md - docs/COMMANDS.html - docs/README.html - docs/index.html - docs/index.html.bak\n LazyOwn on HackTheBox: https://app.hackthebox.com/teams/overview/6429 \n\n LazyOwn/ https://grisuno.github.io/LazyOwn/ \n\n \n\n Fecha: Tue Oct 1 01:42:32 2024 -0300 \n\n Hora: 1727757752
7126+
7127+
70987128
### Pruebas
70997129
71007130
### Otros

UTILS.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -536,6 +536,19 @@ and stderr) in a variable. If interrupted, the process is terminated gracefully.
536536
Example:
537537
To execute a command, call `run_command("ls -l")`.
538538

539+
## generate_random_cve_id
540+
No description available.
541+
542+
## get_credentials
543+
Searches for credential files with the pattern 'credentials*.txt' and allows the user to select one.
544+
545+
The function lists all matching files and prompts the user to select one. It then reads the selected file
546+
and returns a list of tuples with the format (username, password) for each line in the file.
547+
548+
Returns:
549+
list of tuples: A list containing tuples with (username, password) for each credential found in the file.
550+
If no files are found or an invalid selection is made, an empty list is returned.
551+
539552
## wrapper
540553
internal wrapper of internal function to implement multiples rhost to operate.
541554

0 commit comments

Comments
 (0)