I have imitated the good points of many tools. In Japanese, imitating is called “Pakuru”.
ぱくる (godan conjugation, hiragana and katakana パクる, rōmaji pakuru)
- eat with a wide open mouth
- steal when one isn't looking, snatch, swipe
- copy someone's idea or design
- nab, be caught by the police
Sometimes, the penetration testers love to perform a complicated job. However, I always prefer the easy way. PAKURI is an semi-automated user-friendly penetration testing tool framework. You can run the popular pentest tools using only the numeric keypad, just like a game. It is also a good entry tool for the beginners. They can use PAKURI to learn the flow to the penetration testing without struggling with a confusing command line/tools.
Abilities of "PAKURI"
- Intelligence gathering.
- Vulnerability analysis.
- Brute Force Attack.
By using our PAKURI, you will benefit from the following.
(a) Red Teams can easily perform operations such as information enumeration and vulnerability scanning.
(b) Visualizing the survey results is possible only with the numeric keypad.
(c) The Blue Team can experience a dummy attack by simply operating the numeric keypad even they do not have any penetration testing skill.
(d) PAKURI has been created to support the early stages of penetration testing. These can be achieved with what is included in Kali-Tools. It can be useful for training the entry level pentesters.
|If you are interested, please use them in an environment under your control and at your own risk. And, if you execute the PAKURI on systems that are not under your control, it may be considered an attack and you may have legally liabillity for your action.|
- PAKURI can be operated with CUI and does not require a high-spec machine, so it can be operated with Raspberry Pi.
Update your apt and install git:
root@kali:~# apt update root@kali:~# apt install git
Download the PAKURI installer from the PAKURI Github repository:
root@kali:~# git clone https://github.com/01rabbit/PAKURI.git
CD into the PAKURI folder and run the install script:
root@kali:~# cd PAKURI root@kali:~/PAKURI# bash install.sh
Check the OpenVAS admin user and password set them in the .config file:
root@kali:~# vim /usr/share/PAKURI/.config ...snip... # OpenVAS OMPUSER="admin" OMPPASS="admin"
Start Faraday-Server and set workspace:
root@kali:~# systemctl start faraday-server.service root@kali:~# firefox localhost:5985
Set Workspace in the .config file.
root@kali:~# vim /usr/share/PAKURI/.config ...snip... # Faraday WORKSPACE="test_workspace"
CD into the PAKURI folder:
root@kali:~# cd /usr/share/PAKURI
root@kali:/usr/share/PAKURI# ./pakuri.sh ██████╗ █████╗ ██╗ ██╗ ██╗ ██╗ ██████╗ ██╗ ██╔══██╗ ██╔══██╗ ██║ ██╔╝ ██║ ██║ ██╔══██╗ ██║ ██████╔╝ ███████║ █████╔╝ ██║ ██║ ██████╔╝ ██║ ██╔═══╝ ██╔══██║ ██╔═██╗ ██║ ██║ ██╔══██╗ ██║ ██║ ██╗██║ ██║██╗██║ ██╗██╗╚██████╔╝██╗██║ ██║██╗██║ ╚═╝ ╚═╝╚═╝ ╚═╝╚═╝╚═╝ ╚═╝╚═╝ ╚═════╝ ╚═╝╚═╝ ╚═╝╚═╝╚═╝ - Penetration Test Achive Knowledge Unite Rapid Interface - inspired by CDI v1.0.2 Author : Mr.Rabbit Sun 29 Dec 2019 22:25:07 PM EST Working Directory : /root/demo ---------------------- Main Menu ----------------------- +---+ | 1 | Scanning +---+ +---+ | 2 | Exploit +---+ +---+ | 3 | Config +---+ +---+ | 4 | Assist +---+ +---+ | 9 | Back +---+
PAKURI is not fully automated and requires the user interactions, to make sure to proceed the pentest and to avoid any unintended attack or trouble.
By operating the numeric keypad, it is possible to scan the network, scan for vulnerabilities, and perform simple pseudo attacks.
Operation check environment
- OS: KAli Linux 2019.4
- Memory: 8.0GB
This is intended for use Kali Linux. Operation on other OS is not guaranteed.
Feature request / bug reports: https://github.com/01rabbit/PAKURI/issues