Skip to content

Lucho-A/Auditing-Cybersecurity

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Auditing-Cybersecurity (aka Mr. Anderson)

Cybersecurity framework developed in C, Ansi-style

Intended for auditing/security assessment, the program scan by using a TCP Stealth mode, the X top risk ports of a server (max. 5000) or all ports, and, eventually, it carries out some hacking procedures (port banner grabbing, CERT grabbing, BFA, DoS, Metasploits, nMap scripts, etc.) on opened ports by running own code (using, mainly: sockets, libpcap, libnet, libSSH2, and libCurl, among others libraries) and/or the latest free third-party softwares (for instance: Dig, Fierce, nMap, Metasploit, SQLMap, among others).

The main objective of the program is provide a framework with the essentials commands/tools for ensuring, by their use, a well-knowledge of the effectiveness and efficiency of the implemented controls, in order to evaluate the residual risk of an assessment.

Finally, just mention that, since v1.2.4, I started to incorporate AI into the program in order to support a revision and conclusions.

Changelog

Follow the rabbit...

(\(\
( -.-)
o_(")(")

Installation

Dependencies:

sudo apt-get install libcurl4-gnutls-dev libssh2-1-dev libmysqlclient-dev libc6-dev libpq-dev libsmbclient-dev libssl3 libodbc2 libreadline-dev libpcap0.8-dev libnet1-dev libftp-dev unixodbc-dev libesmtp-dev

Note: ODPI-C does require Oracle Client libraries: https://odpi-c.readthedocs.io/en/latest/user_guide/installation.html

Compilation:

git clone https://github.com/lucho-a/Auditing-Cybersecurity.git
cd Auditing-Cybersecurity/src
gcc -o "auditing-cybersecurity" auditing-cybersecurity.c auditing-cybersecurity.h  others/* ports/* activities/* libodpi/* -lsmbclient -lnet -lpcap -lreadline -lm -lodbc -lcrypto -lssl -lcurl -lssh2 -lpq -lmysqlclient -lftp -lesmtp
set -e
sudo setcap CAP_NET_RAW=+eip auditing-cybersecurity

Optional (recommended) third-party software's:

sudo apt-get install nmap metasploit-framework sqlmap fierce dnsenum traceroute whois

Then, you will need "resource" files in order to perform the scanning, and specifying the different brute force attack usernames & password files, HTTP grabbing files, etc.: link

Finally:

auditing-cybersecurity --help

Documentation

(Under development)

Feedback

Any doubt, suggestion or feedback, pls, just contact me.