dedsploit - Framework For Attacking Network Protocols



Saturday, December 10, 2016


Framework for attacking network protocols and network exploitation.

I. Introduction
I don't look back anymore. I don't regret. I look forward
Aiden Pearce 
Yes, Watch Dogs has heavily influenced us when writing this framework. This entire project brought upon a lot of the ideals from the Watch Dogs franchise, and even actual hacking culture, to life. This framework aims to exploit and attack some common every-day vulnerabilities, whether it is a misconfiguration of a SSH server, or even the utilization of apache2 as a web server, which could be subjected to malicious Slowloris DoS attacks.

The framework comprises of several modules, and within each module will be attack vectors.

main
|
+--SSH
|    +--
|       |- bruteforce - bruteforce vulnerable SSH server
|
+--SMTP
|     +--
|        | - bruteforce - bruteforce SMTP address (aka email)
|        |
|        | - smsbomb - utilizes smtp-to-email gateway to spam SMS messages
|
+--HTTP
|      +--
|         | - arpspoof - MITM where user fakes ARP messages on LAN, intercepting packets from host
|         |
|         | - slowloris - Layer-7 DoS attack using slow headers and malformed GET requests to a vulnerable web server
|
+--Recon
|       +--
|          | - pscan - port scan with Nmap
|          |
|          | - hosts - scan for active hosts
|
+------

II. Installation & Usage
In order to install this program, it is best that you are on a Linux-based distro, preferably Kali-Linux . You may also be on macOS, but this rollout is tentative and may be buggy.
First, git clone .
git clone https://github.com/ex0dus-0x/dedsploit
Change directory, and then run the installer script (Must be root or have superuser permissions):
cd /path/to/dedsploit
sudo python installer.py
The installer.py script will install of the necessary dependencies for you. Note that other platforms will be supported in the future (for now, manually install, especially if you don't use apt-get as a package manager).
Once finished, execute with*:
dedsploit
  • if on macOS follow the directions given at the end.
Example of the ssh bruteforce module in use:
asciicast




Subscribe via e-mail for updates!