pwn 0.4.676 → 0.4.677

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: fa9249af262af0f9d2dbaea4245691d09da20bc452967e60095ff4c28a404eba
4
- data.tar.gz: 02b24daf26e3107a37e25392e27fd4176a0a7c8af63f41d3f8c38bf2d3207abc
3
+ metadata.gz: 4b08c03bca8748c1673aeaa0a8b30acda7dbe487a82bf560d9aa571838fd702b
4
+ data.tar.gz: d0113d2805a39025ebd803b8cc0e9495d9aa6056fb32d4d6320aa9d8bd8b7d78
5
5
  SHA512:
6
- metadata.gz: c648625f56139d973443eee4ba91478e6b9a6e67db1d38c65a86de2b8cba6b245046616a426d9c8ed865b1a20250744b4d5eaf158022b218e58d3ab9051edfbb
7
- data.tar.gz: 3955ada6705bfefdc4ec255e60de2b9579dba5407e8ebb36cad2a20ed96ba89cb5285ab540ed0974bab11d381cf7cb2a35da63e81bf39212f388cd4e579bc9c0
6
+ metadata.gz: c40a210871e71d7ebca31526807bc03094d87ecb2792da9df14b221efaa8dcbafb13e87a0696d60a85b86dd1620bdd05baca612950ac0eb0e3049debd340b171
7
+ data.tar.gz: eeba9b20072682b6101fd80dab9376bc95fc0d4093d3b83765a378acb106e7f043352ae2d21ba983ed0ce1b10a0024a3f9fc63560b5a14da99a58380bdf97b8a
data/README.md CHANGED
@@ -37,7 +37,7 @@ $ rvm use ruby-3.2.2@pwn
37
37
  $ rvm list gemsets
38
38
  $ gem install --verbose pwn
39
39
  $ pwn
40
- pwn[v0.4.676]:001 >>> PWN.help
40
+ pwn[v0.4.677]:001 >>> PWN.help
41
41
  ```
42
42
 
43
43
  [![Installing the pwn Security Automation Framework](https://raw.githubusercontent.com/0dayInc/pwn/master/documentation/pwn_install.png)](https://youtu.be/G7iLUY4FzsI)
@@ -52,7 +52,7 @@ $ rvm use ruby-3.2.2@pwn
52
52
  $ gem uninstall --all --executables pwn
53
53
  $ gem install --verbose pwn
54
54
  $ pwn
55
- pwn[v0.4.676]:001 >>> PWN.help
55
+ pwn[v0.4.677]:001 >>> PWN.help
56
56
  ```
57
57
 
58
58
 
@@ -155,6 +155,7 @@ begin
155
155
  puts '- PHASE 1: Target Discovery'
156
156
  PWN::Plugins::NmapIt.port_scan do |nmap|
157
157
  if with_tor
158
+ nmap.proxies = proxy
158
159
  nmap.syn_discovery = discovery_tcp_ports.values
159
160
  nmap.ack_discovery = discovery_tcp_ports.values
160
161
  else
@@ -175,7 +176,6 @@ begin
175
176
  nmap.min_parallelism = 36
176
177
  nmap.max_retries = 3
177
178
  nmap.max_scan_delay = 3
178
- nmap.proxies = proxy if with_tor
179
179
  end
180
180
 
181
181
  # Generate targets.txt from discovery above
@@ -203,17 +203,18 @@ begin
203
203
  phase1_ended_at_parse = Time.parse(phase1_ended_at)
204
204
  elapsed_in_seconds = (phase1_ended_at_parse - started_at_parse).to_f
205
205
  fmt_elapsed_in_seconds = format('%0.2f', elapsed_in_seconds)
206
- puts "\n\n\n#{banner}"
206
+ puts "\n#{banner}"
207
207
  puts "- DISCOVERY COMPLETE! DURATION: #{fmt_elapsed_in_seconds} seconds"
208
+ puts banner
208
209
 
209
210
  puts "\n\n\n#{banner}"
210
211
  puts '- PHASE 2: TCP Port Scanning'
212
+ puts banner
211
213
  phase2_started_at = Time.now.strftime(ftimestr)
212
214
  phase2_started_at_parse = Time.parse(phase2_started_at)
213
215
 
214
216
  # Switch Tor Exit Node if with_tor
215
217
  if with_tor
216
- puts "\n\n\n#{banner}"
217
218
  puts '- INFO: Switching to Clean Tor Circuit...'
218
219
  PWN::Plugins::Tor.switch_exit_node(tor_obj: tor_obj)
219
220
  end
@@ -222,6 +223,7 @@ begin
222
223
  # Using -T5 template to reduce number of
223
224
  # retransmission attempts on filtered ports.
224
225
  PWN::Plugins::NmapIt.port_scan do |nmap|
226
+ nmap.proxies = proxy if with_tor
225
227
  nmap.verbose = true
226
228
  nmap.target_file = target_file
227
229
  nmap.randomize_hosts = true
@@ -240,24 +242,24 @@ begin
240
242
  nmap.min_parallelism = 36
241
243
  nmap.max_retries = 3
242
244
  nmap.max_scan_delay = 3
243
- nmap.proxies = proxy if with_tor
244
245
  end
245
246
  FileUtils.cp("#{latest_tcp_results}.nmap", "#{latest_tcp_results}.txt")
246
247
  phase2_ended_at = Time.now.strftime(ftimestr)
247
248
  phase2_ended_at_parse = Time.parse(phase2_ended_at)
248
249
  elapsed_in_seconds = (phase2_ended_at_parse - phase2_started_at).to_f
249
250
  fmt_elapsed_in_seconds = format('%0.2f', elapsed_in_seconds)
250
- puts "\n\n\n#{banner}"
251
+ puts "\n#{banner}"
251
252
  puts "- TCP SCAN COMPLETE! DURATION: #{fmt_elapsed_in_seconds} seconds"
253
+ puts banner
252
254
 
253
255
  puts "\n\n\n#{banner}"
254
256
  puts '- PHASE 3: UDP Port Scanning'
257
+ puts banner
255
258
  phase3_started_at = Time.now.strftime(ftimestr)
256
259
  phase3_started_at_parse = Time.parse(phase3_started_at)
257
260
 
258
261
  # Switch Tor Exit Node if with_tor
259
262
  if with_tor
260
- puts "\n\n\n#{banner}"
261
263
  puts '- INFO: Switching to Clean Tor Circuit...'
262
264
  PWN::Plugins::Tor.switch_exit_node(tor_obj: tor_obj)
263
265
  end
@@ -266,7 +268,9 @@ begin
266
268
  # Using -T5 template to reduce number of
267
269
  # retransmission attempts on filtered ports.
268
270
  PWN::Plugins::NmapIt.port_scan do |nmap|
269
- unless with_tor
271
+ if with_tor
272
+ nmap.proxies = proxy
273
+ else with_tor
270
274
  nmap.default_script = true
271
275
  nmap.update_scriptdb = true
272
276
  end
@@ -287,15 +291,15 @@ begin
287
291
  nmap.max_retries = 0
288
292
  nmap.max_scan_delay = 3
289
293
  nmap.data_length = Random.rand(1..256)
290
- nmap.proxies = proxy if with_tor
291
294
  end
292
295
  FileUtils.cp("#{latest_udp_results}.nmap", "#{latest_udp_results}.txt")
293
296
  phase3_ended_at = Time.now.strftime(ftimestr)
294
297
  phase3_ended_at_parse = Time.parse(phase3_ended_at)
295
298
  elapsed_in_seconds = (phase3_ended_at_parse - phase3_started_at).to_f
296
299
  fmt_elapsed_in_seconds = format('%0.2f', elapsed_in_seconds)
297
- puts "\n\n\n#{banner}"
300
+ puts "\n#{banner}"
298
301
  puts "- UDP SCAN COMPLETE! DURATION: #{fmt_elapsed_in_seconds} seconds"
302
+ puts banner
299
303
  rescue SystemExit, Interrupt
300
304
  puts "\nGoodbye."
301
305
  rescue StandardError => e
@@ -303,13 +307,11 @@ rescue StandardError => e
303
307
  ensure
304
308
  tor_obj = PWN::Plugins::Tor.stop(tor_obj: tor_obj) if with_tor
305
309
  ended_at = Time.now.strftime(ftimestr)
306
- puts "\n\n\n#{banner}"
307
- puts "- ENDED: #{ended_at}"
308
-
309
310
  ended_at_parse = Time.parse(ended_at)
310
311
  elapsed_in_seconds = (ended_at_parse - started_at_parse).to_f
311
312
  fmt_elapsed_in_seconds = format('%0.2f', elapsed_in_seconds)
312
313
  puts "\n\n\n#{banner}"
314
+ puts "- ENDED: #{ended_at}"
313
315
  puts "- SCAN COMPLETE! DURATION: #{fmt_elapsed_in_seconds} seconds"
314
316
  puts banner
315
317
  end
data/lib/pwn/version.rb CHANGED
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module PWN
4
- VERSION = '0.4.676'
4
+ VERSION = '0.4.677'
5
5
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: pwn
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.4.676
4
+ version: 0.4.677
5
5
  platform: ruby
6
6
  authors:
7
7
  - 0day Inc.