Advertisement
Guest User

spartasetup

a guest
Jun 17th, 2019
309
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.92 KB | None | 0 0
  1. [GeneralSettings]
  2. default-terminal=gnome-terminal
  3. tool-output-black-background=False
  4. screenshooter-timeout=15000
  5. web-services="http,https,ssl,soap,http-proxy,http-alt,https-alt"
  6. enable-scheduler=True
  7. enable-scheduler-on-import=False
  8. max-fast-processes=10
  9. max-slow-processes=10
  10.  
  11. [BruteSettings]
  12. store-cleartext-passwords-on-exit=True
  13. username-wordlist-path=/usr/share/wordlists/
  14. password-wordlist-path=/usr/share/wordlists/
  15. default-username=root
  16. default-password=password
  17. services="asterisk,afp,cisco,cisco-enable,cvs,firebird,ftp,ftps,http-head,http-get,https-head,https-get,http-get-form,http-post-form,https-get-form,https-post-form,http-proxy,http-proxy-urlenum,icq,imap,imaps,irc,ldap2,ldap2s,ldap3,ldap3s,ldap3-crammd5,ldap3-crammd5s,ldap3-digestmd5,ldap3-digestmd5s,mssql,mysql,ncp,nntp,oracle-listener,oracle-sid,pcanywhere,pcnfs,pop3,pop3s,postgres,rdp,rexec,rlogin,rsh,s7-300,sip,smb,smtp,smtps,smtp-enum,snmp,socks5,ssh,sshkey,svn,teamspeak,telnet,telnets,vmauthd,vnc,xmpp"
  18. no-username-services="cisco,cisco-enable,oracle-listener,s7-300,snmp,vnc"
  19. no-password-services="oracle-sid,rsh,smtp-enum"
  20.  
  21. [StagedNmapSettings]
  22. stage1-ports="T:80,443"
  23. stage2-ports="T:25,135,137,139,445,1433,3306,5432,U:137,161,162,1434"
  24. stage3-ports="T:23,21,22,110,111,2049,3389,8080,U:500,5060"
  25. stage4-ports="T:0-20,24,26-79,81-109,112-134,136,138,140-442,444,446-1432,1434-2048,2050-3305,3307-3388,3390-5431,5433-8079,8081-29999"
  26. stage5-ports=T:30000-65535
  27.  
  28. [ToolSettings]
  29. nmap-path=/usr/bin/nmap
  30. hydra-path=/usr/bin/hydra
  31. cutycapt-path=/usr/bin/cutycapt
  32. texteditor-path=/usr/bin/leafpad
  33.  
  34. [HostActions]
  35. nmap-fast-tcp=Run nmap (fast TCP), nmap -Pn -F -T4 -vvvv [IP] -oA \"[OUTPUT]\"
  36. nmap-full-tcp=Run nmap (full TCP), nmap -Pn -sV -sC -O -p- -T4 -vvvvv [IP] -oA \"[OUTPUT]\"
  37. nmap-fast-udp=Run nmap (fast UDP), "nmap -n -Pn -sU -F --min-rate=1000 -vvvvv [IP] -oA \"[OUTPUT]\""
  38. nmap-udp-1000=Run nmap (top 1000 quick UDP), "nmap -n -Pn -sU --min-rate=1000 -vvvvv [IP] -oA \"[OUTPUT]\""
  39. nmap-full-udp=Run nmap (full UDP), nmap -n -Pn -sU -p- -T4 -vvvvv [IP] -oA \"[OUTPUT]\"
  40. unicornscan-full-udp=Run unicornscan (full UDP), unicornscan -mU -Ir 1000 [IP]:a -v
  41.  
  42. [PortActions]
  43. banner=Grab banner, bash -c \"echo \"\" | nc -v -n -w1 [IP] [PORT]\",
  44. nmap=Run nmap (scripts) on port, nmap -Pn -sV -sC -vvvvv -p[PORT] [IP] -oA [OUTPUT],
  45. nikto=Run nikto, nikto -o \"[OUTPUT].txt\" -p [PORT] -h [IP], "http,https,ssl,soap,http-proxy,http-alt"
  46. dirbuster=Launch dirbuster, java -Xmx256M -jar /usr/share/dirbuster/DirBuster-1.0-RC1.jar -u http://[IP]:[PORT]/, "http,https,ssl,soap,http-proxy,http-alt"
  47. webslayer=Launch webslayer, webslayer, "http,https,ssl,soap,http-proxy,http-alt"
  48. whatweb=Run whatweb, "whatweb [IP]:[PORT] --color=never --log-brief=\"[OUTPUT].txt\"", "http,https,ssl,soap,http-proxy,http-alt"
  49. samrdump=Run samrdump, python /usr/share/doc/python-impacket/examples/samrdump.py [IP] [PORT]/SMB, "netbios-ssn,microsoft-ds"
  50. nbtscan=Run nbtscan, nbtscan -v -h [IP], netbios-ns
  51. smbenum=Run smbenum, bash ./scripts/smbenum.sh [IP], "netbios-ssn,microsoft-ds"
  52. enum4linux=Run enum4linux, enum4linux [IP], "netbios-ssn,microsoft-ds"
  53. polenum=Extract password policy (polenum), polenum [IP], "netbios-ssn,microsoft-ds"
  54. smb-enum-users=Enumerate users (nmap), "nmap -p[PORT] --script=smb-enum-users [IP] -vvvvv", "netbios-ssn,microsoft-ds"
  55. smb-enum-users-rpc=Enumerate users (rpcclient), bash -c \"echo 'enumdomusers' | rpcclient [IP] -U%\", "netbios-ssn,microsoft-ds"
  56. smb-enum-admins=Enumerate domain admins (net), "net rpc group members \"Domain Admins\" -I [IP] -U% ", "netbios-ssn,microsoft-ds"
  57. smb-enum-groups=Enumerate groups (nmap), "nmap -p[PORT] --script=smb-enum-groups [IP] -vvvvv", "netbios-ssn,microsoft-ds"
  58. smb-enum-shares=Enumerate shares (nmap), "nmap -p[PORT] --script=smb-enum-shares [IP] -vvvvv", "netbios-ssn,microsoft-ds"
  59. smb-enum-sessions=Enumerate logged in users (nmap), "nmap -p[PORT] --script=smb-enum-sessions [IP] -vvvvv", "netbios-ssn,microsoft-ds"
  60. smb-enum-policies=Extract password policy (nmap), "nmap -p[PORT] --script=smb-enum-domains [IP] -vvvvv", "netbios-ssn,microsoft-ds"
  61. smb-null-sessions=Check for null sessions (rpcclient), bash -c \"echo 'srvinfo' | rpcclient [IP] -U%\", "netbios-ssn,microsoft-ds"
  62. ldapsearch=Run ldapsearch, ldapsearch -h [IP] -p [PORT] -x -s base, ldap
  63. snmpcheck=Run snmpcheck, snmp-check -t [IP], "snmp,snmptrap"
  64. rpcinfo=Run rpcinfo, rpcinfo -p [IP], rpcbind
  65. rdp-sec-check=Run rdp-sec-check.pl, perl ./scripts/rdp-sec-check.pl [IP]:[PORT], ms-wbt-server
  66. showmount=Show nfs shares, showmount -e [IP], nfs
  67. x11screen=Run x11screenshot, bash ./scripts/x11screenshot.sh [IP], X11
  68. sslscan=Run sslscan, sslscan --no-failed [IP]:[PORT], "https,ssl"
  69. sslyze=Run sslyze, sslyze --regular [IP]:[PORT], "https,ssl,ms-wbt-server,imap,pop3,smtp"
  70. rwho=Run rwho, rwho -a [IP], who
  71. finger=Enumerate users (finger), ./scripts/fingertool.sh [IP], finger
  72. smtp-enum-vrfy=Enumerate SMTP users (VRFY), smtp-user-enum -M VRFY -U /usr/share/metasploit-framework/data/wordlists/unix_users.txt -t [IP] -p [PORT], smtp
  73. smtp-enum-expn=Enumerate SMTP users (EXPN), smtp-user-enum -M EXPN -U /usr/share/metasploit-framework/data/wordlists/unix_users.txt -t [IP] -p [PORT], smtp
  74. smtp-enum-rcpt=Enumerate SMTP users (RCPT), smtp-user-enum -M RCPT -U /usr/share/metasploit-framework/data/wordlists/unix_users.txt -t [IP] -p [PORT], smtp
  75. ftp-default=Check for default ftp credentials, hydra -s [PORT] -C ./wordlists/ftp-default-userpass.txt -u -o \"[OUTPUT].txt\" -f [IP] ftp, ftp
  76. mssql-default=Check for default mssql credentials, hydra -s [PORT] -C ./wordlists/mssql-default-userpass.txt -u -o \"[OUTPUT].txt\" -f [IP] mssql, ms-sql-s
  77. mysql-default=Check for default mysql credentials, hydra -s [PORT] -C ./wordlists/mysql-default-userpass.txt -u -o \"[OUTPUT].txt\" -f [IP] mysql, mysql
  78. oracle-default=Check for default oracle credentials, hydra -s [PORT] -C ./wordlists/oracle-default-userpass.txt -u -o \"[OUTPUT].txt\" -f [IP] oracle-listener, oracle-tns
  79. postgres-default=Check for default postgres credentials, hydra -s [PORT] -C ./wordlists/postgres-default-userpass.txt -u -o \"[OUTPUT].txt\" -f [IP] postgres, postgresql
  80. snmp-default=Check for default community strings, python ./scripts/snmpbrute.py -t [IP] -p [PORT] -f ./wordlists/snmp-default.txt -b --no-colours, "snmp,snmptrap"
  81. snmp-brute=Bruteforce community strings (medusa), bash -c \"medusa -h [IP] -u root -P ./wordlists/snmp-default.txt -M snmp | grep SUCCESS\", "snmp,snmptrap"
  82. oracle-version=Get version, "msfcli auxiliary/scanner/oracle/tnslsnr_version rhosts=[IP] E", oracle-tns
  83. oracle-sid=Oracle SID enumeration, "msfcli auxiliary/scanner/oracle/sid_enum rhosts=[IP] E", oracle-tns
  84.  
  85. [PortTerminalActions]
  86. netcat=Open with netcat, nc -v [IP] [PORT],
  87. telnet=Open with telnet, telnet [IP] [PORT],
  88. ftp=Open with ftp client, ftp [IP] [PORT], ftp
  89. mysql=Open with mysql client (as root), "mysql -u root -h [IP] --port=[PORT] -p", mysql
  90. mssql=Open with mssql client (as sa), python /usr/share/doc/python-impacket/examples/mssqlclient.py -p [PORT] sa@[IP], "mys-sql-s,codasrv-se"
  91. ssh=Open with ssh client (as root), ssh root@[IP] -p [PORT], ssh
  92. psql=Open with postgres client (as postgres), psql -h [IP] -p [PORT] -U postgres, postgres
  93. rdesktop=Open with rdesktop, rdesktop [IP]:[PORT], ms-wbt-server
  94. rpcclient=Open with rpcclient (NULL session), rpcclient [IP] -p [PORT] -U%, "netbios-ssn,microsoft-ds"
  95. vncviewer=Open with vncviewer, vncviewer [IP]:[PORT], vnc
  96. xephyr=Open with Xephyr, Xephyr -query [IP] :1, xdmcp
  97. rlogin=Open with rlogin, rlogin -i root -p [PORT] [IP], login
  98. rsh=Open with rsh, rsh -l root [IP], shell
  99.  
  100. [SchedulerSettings]
  101. nikto="http,https,ssl,soap,http-proxy,http-alt,https-alt", tcp
  102. screenshooter="http,https,ssl,http-proxy,http-alt,https-alt", tcp
  103. smbenum=microsoft-ds, tcp
  104. snmpcheck=snmp, udp
  105. x11screen=X11, tcp
  106. snmp-default=snmp, udp
  107. smtp-enum-vrfy=smtp, tcp
  108. mysql-default=mysql, tcp
  109. mssql-default=ms-sql-s, tcp
  110. ftp-default=ftp, tcp
  111. postgres-default=postgresql, tcp
  112. oracle-default=oracle-tns, tcp
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement