Skip to content

omidraha/cop

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

62 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Call Of Penetration (cop!)

Doing some penetration testing automatically.

  • Information Gathering:
    • Tasks:
      • Whois IP
      • Extract network range, network name, description, address, country, city, phone, fax_number, fax-no
    • Tools:
      • whois
  • Network:
    • Tasks:
      • Check host is up
      • Scan top 100 ports and discover states of TCP and UDP ports including: open, closed, filtered, unfiltered, open|filtered or closed|filtered.
      • Scan all TCP and UDP ports, from 0 to 65535
      • Detect os
      • Detect services with version info
    • Tools:
      • nmap, masscan
  • DNS:
    • Tasks:
      • Performing DNS lookup
      • Performing reverse DNS lookup
      • Getting name server records
      • Getting name servers bind version
      • Getting any type of ns record information
      • Checking DNSSEC
      • Checking wildcard DNS
      • Checking DNS allow recursion
      • Checking DNS zone transfer
    • Tools:
      • dig
  • Brute Force:
    • Tasks:
      • sub domains
    • Tools:
      • dig
  • Probe Services:
    • Tasks:
      • ftp
        • Anonymous access detection
      • ssh
        • Detect ssh authentication types available
        • Username enumeration time-based attack for OpenSSH
      • rpcbind
        • Connect to PortMapper and fetches list of registered programs
    • Tools:
      • nmap, ssh, rpcinfo

Tools

Usage

$ git clone https://github.com/omidraha/cop.git
$ cd cop
$ pip install -r requirements.txt
$ ./cop.py

About

Call Of Penetration (cop!)

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages