pwn 0.4.676 → 0.4.677

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: fa9249af262af0f9d2dbaea4245691d09da20bc452967e60095ff4c28a404eba
4
- data.tar.gz: 02b24daf26e3107a37e25392e27fd4176a0a7c8af63f41d3f8c38bf2d3207abc
3
+ metadata.gz: 4b08c03bca8748c1673aeaa0a8b30acda7dbe487a82bf560d9aa571838fd702b
4
+ data.tar.gz: d0113d2805a39025ebd803b8cc0e9495d9aa6056fb32d4d6320aa9d8bd8b7d78
5
5
  SHA512:
6
- metadata.gz: c648625f56139d973443eee4ba91478e6b9a6e67db1d38c65a86de2b8cba6b245046616a426d9c8ed865b1a20250744b4d5eaf158022b218e58d3ab9051edfbb
7
- data.tar.gz: 3955ada6705bfefdc4ec255e60de2b9579dba5407e8ebb36cad2a20ed96ba89cb5285ab540ed0974bab11d381cf7cb2a35da63e81bf39212f388cd4e579bc9c0
6
+ metadata.gz: c40a210871e71d7ebca31526807bc03094d87ecb2792da9df14b221efaa8dcbafb13e87a0696d60a85b86dd1620bdd05baca612950ac0eb0e3049debd340b171
7
+ data.tar.gz: eeba9b20072682b6101fd80dab9376bc95fc0d4093d3b83765a378acb106e7f043352ae2d21ba983ed0ce1b10a0024a3f9fc63560b5a14da99a58380bdf97b8a
data/README.md CHANGED
@@ -37,7 +37,7 @@ $ rvm use ruby-3.2.2@pwn
37
37
  $ rvm list gemsets
38
38
  $ gem install --verbose pwn
39
39
  $ pwn
40
- pwn[v0.4.676]:001 >>> PWN.help
40
+ pwn[v0.4.677]:001 >>> PWN.help
41
41
  ```
42
42
 
43
43
  [![Installing the pwn Security Automation Framework](https://raw.githubusercontent.com/0dayInc/pwn/master/documentation/pwn_install.png)](https://youtu.be/G7iLUY4FzsI)
@@ -52,7 +52,7 @@ $ rvm use ruby-3.2.2@pwn
52
52
  $ gem uninstall --all --executables pwn
53
53
  $ gem install --verbose pwn
54
54
  $ pwn
55
- pwn[v0.4.676]:001 >>> PWN.help
55
+ pwn[v0.4.677]:001 >>> PWN.help
56
56
  ```
57
57
 
58
58
 
@@ -155,6 +155,7 @@ begin
155
155
  puts '- PHASE 1: Target Discovery'
156
156
  PWN::Plugins::NmapIt.port_scan do |nmap|
157
157
  if with_tor
158
+ nmap.proxies = proxy
158
159
  nmap.syn_discovery = discovery_tcp_ports.values
159
160
  nmap.ack_discovery = discovery_tcp_ports.values
160
161
  else
@@ -175,7 +176,6 @@ begin
175
176
  nmap.min_parallelism = 36
176
177
  nmap.max_retries = 3
177
178
  nmap.max_scan_delay = 3
178
- nmap.proxies = proxy if with_tor
179
179
  end
180
180
 
181
181
  # Generate targets.txt from discovery above
@@ -203,17 +203,18 @@ begin
203
203
  phase1_ended_at_parse = Time.parse(phase1_ended_at)
204
204
  elapsed_in_seconds = (phase1_ended_at_parse - started_at_parse).to_f
205
205
  fmt_elapsed_in_seconds = format('%0.2f', elapsed_in_seconds)
206
- puts "\n\n\n#{banner}"
206
+ puts "\n#{banner}"
207
207
  puts "- DISCOVERY COMPLETE! DURATION: #{fmt_elapsed_in_seconds} seconds"
208
+ puts banner
208
209
 
209
210
  puts "\n\n\n#{banner}"
210
211
  puts '- PHASE 2: TCP Port Scanning'
212
+ puts banner
211
213
  phase2_started_at = Time.now.strftime(ftimestr)
212
214
  phase2_started_at_parse = Time.parse(phase2_started_at)
213
215
 
214
216
  # Switch Tor Exit Node if with_tor
215
217
  if with_tor
216
- puts "\n\n\n#{banner}"
217
218
  puts '- INFO: Switching to Clean Tor Circuit...'
218
219
  PWN::Plugins::Tor.switch_exit_node(tor_obj: tor_obj)
219
220
  end
@@ -222,6 +223,7 @@ begin
222
223
  # Using -T5 template to reduce number of
223
224
  # retransmission attempts on filtered ports.
224
225
  PWN::Plugins::NmapIt.port_scan do |nmap|
226
+ nmap.proxies = proxy if with_tor
225
227
  nmap.verbose = true
226
228
  nmap.target_file = target_file
227
229
  nmap.randomize_hosts = true
@@ -240,24 +242,24 @@ begin
240
242
  nmap.min_parallelism = 36
241
243
  nmap.max_retries = 3
242
244
  nmap.max_scan_delay = 3
243
- nmap.proxies = proxy if with_tor
244
245
  end
245
246
  FileUtils.cp("#{latest_tcp_results}.nmap", "#{latest_tcp_results}.txt")
246
247
  phase2_ended_at = Time.now.strftime(ftimestr)
247
248
  phase2_ended_at_parse = Time.parse(phase2_ended_at)
248
249
  elapsed_in_seconds = (phase2_ended_at_parse - phase2_started_at).to_f
249
250
  fmt_elapsed_in_seconds = format('%0.2f', elapsed_in_seconds)
250
- puts "\n\n\n#{banner}"
251
+ puts "\n#{banner}"
251
252
  puts "- TCP SCAN COMPLETE! DURATION: #{fmt_elapsed_in_seconds} seconds"
253
+ puts banner
252
254
 
253
255
  puts "\n\n\n#{banner}"
254
256
  puts '- PHASE 3: UDP Port Scanning'
257
+ puts banner
255
258
  phase3_started_at = Time.now.strftime(ftimestr)
256
259
  phase3_started_at_parse = Time.parse(phase3_started_at)
257
260
 
258
261
  # Switch Tor Exit Node if with_tor
259
262
  if with_tor
260
- puts "\n\n\n#{banner}"
261
263
  puts '- INFO: Switching to Clean Tor Circuit...'
262
264
  PWN::Plugins::Tor.switch_exit_node(tor_obj: tor_obj)
263
265
  end
@@ -266,7 +268,9 @@ begin
266
268
  # Using -T5 template to reduce number of
267
269
  # retransmission attempts on filtered ports.
268
270
  PWN::Plugins::NmapIt.port_scan do |nmap|
269
- unless with_tor
271
+ if with_tor
272
+ nmap.proxies = proxy
273
+ else with_tor
270
274
  nmap.default_script = true
271
275
  nmap.update_scriptdb = true
272
276
  end
@@ -287,15 +291,15 @@ begin
287
291
  nmap.max_retries = 0
288
292
  nmap.max_scan_delay = 3
289
293
  nmap.data_length = Random.rand(1..256)
290
- nmap.proxies = proxy if with_tor
291
294
  end
292
295
  FileUtils.cp("#{latest_udp_results}.nmap", "#{latest_udp_results}.txt")
293
296
  phase3_ended_at = Time.now.strftime(ftimestr)
294
297
  phase3_ended_at_parse = Time.parse(phase3_ended_at)
295
298
  elapsed_in_seconds = (phase3_ended_at_parse - phase3_started_at).to_f
296
299
  fmt_elapsed_in_seconds = format('%0.2f', elapsed_in_seconds)
297
- puts "\n\n\n#{banner}"
300
+ puts "\n#{banner}"
298
301
  puts "- UDP SCAN COMPLETE! DURATION: #{fmt_elapsed_in_seconds} seconds"
302
+ puts banner
299
303
  rescue SystemExit, Interrupt
300
304
  puts "\nGoodbye."
301
305
  rescue StandardError => e
@@ -303,13 +307,11 @@ rescue StandardError => e
303
307
  ensure
304
308
  tor_obj = PWN::Plugins::Tor.stop(tor_obj: tor_obj) if with_tor
305
309
  ended_at = Time.now.strftime(ftimestr)
306
- puts "\n\n\n#{banner}"
307
- puts "- ENDED: #{ended_at}"
308
-
309
310
  ended_at_parse = Time.parse(ended_at)
310
311
  elapsed_in_seconds = (ended_at_parse - started_at_parse).to_f
311
312
  fmt_elapsed_in_seconds = format('%0.2f', elapsed_in_seconds)
312
313
  puts "\n\n\n#{banner}"
314
+ puts "- ENDED: #{ended_at}"
313
315
  puts "- SCAN COMPLETE! DURATION: #{fmt_elapsed_in_seconds} seconds"
314
316
  puts banner
315
317
  end
data/lib/pwn/version.rb CHANGED
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module PWN
4
- VERSION = '0.4.676'
4
+ VERSION = '0.4.677'
5
5
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: pwn
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.4.676
4
+ version: 0.4.677
5
5
  platform: ruby
6
6
  authors:
7
7
  - 0day Inc.