mirror of https://github.com/avast/PurpleDome
added nmap sub-attacks
parent
829900d377
commit
73f0e40d99
@ -0,0 +1,41 @@
|
||||
#!/usr/bin/env python3
|
||||
|
||||
# A plugin to nmap targets slow motion, to evade sensors
|
||||
|
||||
from plugins.base.kali import KaliPlugin
|
||||
|
||||
|
||||
class NmapSneakyPlugin(KaliPlugin):
|
||||
|
||||
# Boilerplate
|
||||
name = "nmap_sneaky"
|
||||
description = "Nmap scan the target slowly. To sneak past detection"
|
||||
ttp = "T1595"
|
||||
references = ["https://attack.mitre.org/techniques/T1595/"]
|
||||
|
||||
required_files = [] # Files shipped with the plugin which are needed by the kali tool. Will be copied to the kali share
|
||||
|
||||
def __init__(self):
|
||||
super().__init__()
|
||||
self.plugin_path = __file__
|
||||
|
||||
def run(self, targets):
|
||||
""" Run the command
|
||||
|
||||
@param targets: A list of targets, ip addresses will do
|
||||
"""
|
||||
|
||||
res = ""
|
||||
|
||||
cmd = f"cd {self.get_playground()};"
|
||||
for t in targets:
|
||||
cmd += f"sudo nmap -T1 -F -D RND:5 -f --randomize-hosts {t};"
|
||||
|
||||
res += self.run_cmd(cmd) or ""
|
||||
|
||||
return res
|
||||
|
||||
def get_config_section_name(self):
|
||||
""" Use nmap configuration """
|
||||
|
||||
return "nmap"
|
@ -0,0 +1,41 @@
|
||||
#!/usr/bin/env python3
|
||||
|
||||
# A plugin to nmap targets - in an agressive way to break sensors
|
||||
|
||||
from plugins.base.kali import KaliPlugin
|
||||
|
||||
|
||||
class NmapStresstestPlugin(KaliPlugin):
|
||||
|
||||
# Boilerplate
|
||||
name = "nmap_stresstest"
|
||||
description = "Nmap scan the target. As aggressive as possible to overload sensors. Maybe even crash them"
|
||||
ttp = "T1595"
|
||||
references = ["https://attack.mitre.org/techniques/T1595/"]
|
||||
|
||||
required_files = [] # Files shipped with the plugin which are needed by the kali tool. Will be copied to the kali share
|
||||
|
||||
def __init__(self):
|
||||
super().__init__()
|
||||
self.plugin_path = __file__
|
||||
|
||||
def run(self, targets):
|
||||
""" Run the command
|
||||
|
||||
@param targets: A list of targets, ip addresses will do
|
||||
"""
|
||||
|
||||
res = ""
|
||||
|
||||
cmd = f"cd {self.get_playground()};"
|
||||
for t in targets:
|
||||
cmd += f"nmap -T5 --min-parallelism 100 --max-scan-delay 1 {t};"
|
||||
|
||||
res += self.run_cmd(cmd) or ""
|
||||
|
||||
return res
|
||||
|
||||
def get_config_section_name(self):
|
||||
""" Use nmap configuration """
|
||||
|
||||
return "nmap"
|
Loading…
Reference in New Issue