Hacking Toolkit
Project description
I’m developing Habu to teach (and learn) some concepts about Python and Network Hacking.
Some techniques implemented in the current version are:
ARP Poisoning and Sniffing
DHCP Discover and Starvation
Subdomains Identification
Certificate Cloning
TCP Analysis (ISN, Flags)
Username check on social networks
Web Techonologies Identification
and a lot more!
The development of this software is supported by Securetia SRL (https://www.securetia.com/)
Hacking with Habu
Various useful usage scenarios are detailed in https://fportantier.github.io/hacking-with-habu/
Usage Videos
The following Youtube Playlist has videos that shows the installation and usage:
https://www.youtube.com/watch?v=rgp9seLLyqE&list=PL4HZnX8VnFXqSvNw7x-bXOn0dgxNdfnVD
Telegram Group
If you want to discuss some Habu features, possible improvements, etc, you can use the Habu Telegram Group: https://t.me/python_habu
Contributing
Issues and pull requests must be sent to github repo: https://github.com/fportantier/habu
Installation
Recommended way to install:
$ python3 -m pip install --upgrade git+https://github.com/fportantier/habu.git
This must works on any system that has Python 3 installed.
Note: On some systems (like Microsoft Windows) you must adjust the command to point to the correct path of the Python executable.
Upgrade
Now we have a command to upgrade directly from the Git repo and clean any old command that not longer exists or that has been renamed.
$ habu.upgrade
Get Help
All the commands implement the option ‘–help’, that shows the help, arguments, options, and default values.
Verbose Mode
Almost all commands implement the verbose mode with the ‘-v’ option. This can give you some extra info about what habu is doing.
Commands Index
habu.arp.ping
Usage: habu.arp.ping [OPTIONS] IP
Send ARP packets to check if a host it's alive in the local network.
Example:
# habu.arp.ping 192.168.0.1
Ether / ARP is at a4:08:f5:19:17:a4 says 192.168.0.1 / Padding
Options:
-i TEXT Interface to use
-v Verbose output
--help Show this message and exit.
habu.arp.poison
Usage: habu.arp.poison [OPTIONS] VICTIM1 VICTIM2
Send ARP 'is-at' packets to each victim, poisoning their ARP tables for
send the traffic to your system.
Note: If you want a full working Man In The Middle attack, you need to
enable the packet forwarding on your operating system to act like a
router. You can do that using:
# echo 1 > /proc/sys/net/ipv4/ip_forward
Example:
# habu.arpoison 192.168.0.1 192.168.0.77
Ether / ARP is at f4:96:34:e5:ae:1b says 192.168.0.77
Ether / ARP is at f4:96:34:e5:ae:1b says 192.168.0.70
Ether / ARP is at f4:96:34:e5:ae:1b says 192.168.0.77
...
Options:
-i TEXT Interface to use
-v Verbose
--help Show this message and exit.
habu.arp.sniff
Usage: habu.arp.sniff [OPTIONS]
Listen for ARP packets and show information for each device.
Columns: Seconds from last packet | IP | MAC | Vendor
Example:
1 192.168.0.1 a4:08:f5:19:17:a4 Sagemcom Broadband SAS
7 192.168.0.2 64:bc:0c:33:e5:57 LG Electronics (Mobile Communications)
2 192.168.0.5 00:c2:c6:30:2c:58 Intel Corporate
6 192.168.0.7 54:f2:01:db:35:58 Samsung Electronics Co.,Ltd
Options:
-i TEXT Interface to use
--help Show this message and exit.
habu.asydns
Usage: habu.asydns [OPTIONS]
Requests a DNS domain name based on public and private RSA keys using the
AsyDNS protocol https://github.com/portantier/asydns
Example:
$ habu.asydns -v
Generating RSA key ...
Loading RSA key ...
{
"ip": "181.31.41.231",
"name": "07286e90fd6e7e6be61d6a7919967c7cf3bbfb23a36edbc72b6d7c53.a.asydns.org"
}
$ dig +short 07286e90fd6e7e6be61d6a7919967c7cf3bbfb23a36edbc72b6d7c53.a.asydns.org
181.31.41.231
Options:
-u TEXT API URL
-g Force the generation of a new key pair
-r Revoke the public key
-v Verbose output
--help Show this message and exit.
habu.b64
Usage: habu.b64 [OPTIONS] [F]
Encodes or decode data in base64, just like the command base64.
$ echo awesome | habu.b64
YXdlc29tZQo=
$ echo YXdlc29tZQo= | habu.b64 -d
awesome
Options:
-d decode instead of encode
--help Show this message and exit.
habu.cert.clone
Usage: habu.cert.clone [OPTIONS] HOSTNAME PORT KEYFILE CERTFILE
Connect to an SSL/TLS server, get the certificate and generate a
certificate with the same options and field values.
Note: The generated certificate is invalid, but can be used for social
engineering attacks
Example:
$ habu.certclone www.google.com 443 /tmp/key.pem /tmp/cert.pem
Options:
--copy-extensions Copy certificate extensions (default: False)
--expired Generate an expired certificate (default: False)
-v Verbose
--help Show this message and exit.
habu.cert.crtsh
Usage: habu.cert.crtsh [OPTIONS] DOMAIN
Downloads the certificate transparency logs for a domain and check with
DNS queries if each subdomain exists.
Uses multithreading to improve the performance of the DNS queries.
Example:
$ habu.crtsh securetia.com
alt.securetia.com
other.securetia.com
www.securetia.com
Options:
-c Disable cache
-n Disable DNS subdomain validation
-v Verbose output
--json Print the output in JSON format
--help Show this message and exit.
habu.cert.names
Usage: habu.cert.names [OPTIONS] [NETWORK]
Connects to each host/port and shows a summary of the certificate names.
The hosts to connect to are taken from two possible options:
1. -i option (default: stdin). A file where each line is a host or network
2. An argument that can be a host or network
If you use both methods, the hosts and networks are merged into one list.
Example:
$ habu.cert.names 2.18.60.240/29
2.18.60.241 443 i.s-microsoft.com microsoft.com privacy.microsoft.com
2.18.60.242 443 aod-ssl.itunes.apple.com aod.itunes.apple.com aodp-ssl.itunes.apple.com
2.18.60.243 443 *.mlb.com mlb.com
2.18.60.244 443 [SSL: TLSV1_ALERT_INTERNAL_ERROR] tlsv1 alert internal error (_ssl.c:1056)
2.18.60.245 443 cert2-cn-public-ubiservices.ubi.com cert2-cn-public-ws-ubiservices.ubi.com
2.18.60.246 443 *.blog.sina.com.cn *.dmp.sina.cn
aod.itunes.apple.com
aodp-ssl.itunes.apple.com
aod-ssl.itunes.apple.com
*.blog.sina.com.cn
cert2-cn-public-ubiservices.ubi.com
cert2-cn-public-ws-ubiservices.ubi.com
*.dmp.sina.cn
i.s-microsoft.com microsoft.com
*.mlb.com mlb.com
privacy.microsoft.com
Options:
-p TEXT Ports to connect to (comma separated list)
-i FILENAME Input file (Default: stdin)
-t FLOAT Time to wait for each connection
-v Verbose output
--json Print the output in JSON format
--help Show this message and exit.
habu.config.del
Usage: habu.config.del [OPTIONS] KEY
Delete a KEY from the configuration.
Note: By default, KEY is converted to uppercase.
Example:
$ habu.config.del DNS_SERVER
Options:
--help Show this message and exit.
habu.config.set
Usage: habu.config.set [OPTIONS] KEY VALUE
Set VALUE to the config KEY.
Note: By default, KEY is converted to uppercase.
Example:
$ habu.config.set DNS_SERVER 8.8.8.8
Options:
--help Show this message and exit.
habu.config.show
Usage: habu.config.show [OPTIONS]
Show the current config.
Note: By default, the options with 'KEY' in their name are shadowed.
Example:
$ habu.config.show
{
"DNS_SERVER": "8.8.8.8",
"FERNET_KEY": "*************"
}
Options:
-k, --show-keys Show also the key values
--option TEXT... Write to the config(KEY VALUE)
--help Show this message and exit.
habu.crack.luhn
Usage: habu.crack.luhn [OPTIONS] NUMBER
Having known values for a Luhn validated number, obtain the possible
unknown numbers.
Numbers that use the Luhn algorithm for validation are Credit Cards, IMEI,
National Provider Identifier in the United States, Canadian Social
Insurance Numbers, Israel ID Numbers and Greek Social Security Numbers
(ΑΜΚΑ).
The '-' characters are ignored.
Define the missing numbers with the 'x' character.
Reference: https://en.wikipedia.org/wiki/Luhn_algorithm
Example:
$ habu.crack.luhn 4509-xx08-3160-6445
4509000831606445
4509180831606445
4509260831606445
4509340831606445
4509420831606445
4509590831606445
4509670831606445
4509750831606445
4509830831606445
4509910831606445
Options:
--help Show this message and exit.
habu.crack.snmp
Usage: habu.crack.snmp [OPTIONS] IP
Launches snmp-get queries against an IP, and tells you when finds a valid
community string (is a simple SNMP cracker).
The dictionary used is the distributed with the onesixtyone tool
https://github.com/trailofbits/onesixtyone
Example:
# habu.crack.snmp 179.125.234.210
Community found: private
Community found: public
Note: You can also receive messages like \<UNIVERSAL\> \<class
'scapy.asn1.asn1.ASN1\_Class\_metaclass'\>, I don't know how to supress
them for now.
Options:
-p INTEGER Port to use
-c TEXT Community (default: list of most used)
-s Stop after first match
-v Verbose
--help Show this message and exit.
habu.crypto.fernet
Usage: habu.crypto.fernet [OPTIONS]
Fernet cipher.
Uses AES-128-CBC with HMAC
Note: You must use a key to cipher with Fernet.
Use the -k paramenter or set the FERNET_KEY configuration value.
The keys can be generated with the command habu.crypto.fernet.genkey
Reference: https://github.com/fernet/spec/blob/master/Spec.md
Example:
$ "I want to protect this string" | habu.crypto.fernet
gAAAAABbXnCGoCULLuVNRElYTbEcwnek9iq5jBKq9JAN3wiiBUzPqpUgV5oWvnC6xfIA...
$ echo gAAAAABbXnCGoCULLuVNRElYTbEcwnek9iq5jBKq9JAN3wiiBUzPqpUgV5oWvnC6xfIA... | habu.crypto.fernet -d
I want to protect this string
Options:
-k TEXT Key
-d Decrypt instead of encrypt
--ttl INTEGER Time To Live for timestamp verification
-i FILENAME Input file (default: stdin)
-o FILENAME Output file (default: stdout)
--help Show this message and exit.
habu.crypto.fernet.genkey
Usage: habu.crypto.fernet.genkey [OPTIONS]
Generate a new Fernet Key, optionally write it to ~/.habu.json
Example:
$ habu.crypto.fernet.genkey
xgvWCIvjwe9Uq7NBvwO796iI4dsGD623QOT9GWqnuhg=
Options:
-w Write this key to ~/.habu.json
--help Show this message and exit.
habu.crypto.gppref
Usage: habu.crypto.gppref [OPTIONS] PASSWORD
Decrypt the password of local users added via Windows 2008 Group Policy
Preferences.
This value is the 'cpassword' attribute embedded in the Groups.xml file,
stored in the domain controller's Sysvol share.
Example:
# habu.crypto.gppref AzVJmXh/J9KrU5n0czX1uBPLSUjzFE8j7dOltPD8tLk
testpassword
Options:
--help Show this message and exit.
habu.crypto.hasher
Usage: habu.crypto.hasher [OPTIONS] [F]
Compute various hashes for the input data, that can be a file or a stream.
Example:
$ habu.crypto.hasher README.rst
md5 992a833cd162047daaa6a236b8ac15ae README.rst
ripemd160 0566f9141e65e57cae93e0e3b70d1d8c2ccb0623 README.rst
sha1 d7dbfd2c5e2828eb22f776550c826e4166526253 README.rst
sha256 6bb22d927e1b6307ced616821a1877b6cc35e... README.rst
sha512 8743f3eb12a11cf3edcc16e400fb14d599b4a... README.rst
whirlpool 96bcc083242e796992c0f3462f330811f9e8c... README.rst
You can also specify which algorithm to use. In such case, the output is
only the value of the calculated hash:
$ habu.hasher -a md5 README.rst
992a833cd162047daaa6a236b8ac15ae README.rst
Options:
-a [md5|sha1|sha256|sha512|ripemd160|whirlpool]
Only this algorithm (Default: all)
--help Show this message and exit.
habu.crypto.xor
Usage: habu.crypto.xor [OPTIONS]
XOR cipher.
Note: XOR is not a 'secure cipher'. If you need strong crypto you must use
algorithms like AES. You can use habu.fernet for that.
Example:
$ habu.xor -k mysecretkey -i /bin/ls > xored
$ habu.xor -k mysecretkey -i xored > uxored
$ sha1sum /bin/ls uxored
$ 6fcf930fcee1395a1c95f87dd38413e02deff4bb /bin/ls
$ 6fcf930fcee1395a1c95f87dd38413e02deff4bb uxored
Options:
-k TEXT Encryption key
-i FILENAME Input file (default: stdin)
-o FILENAME Output file (default: stdout)
--help Show this message and exit.
habu.data.enrich
Usage: habu.data.enrich [OPTIONS]
Enrich data adding interesting information.
Example:
$ cat /var/log/auth.log | habu.data.extract.ipv4 | habu.data.enrich
[
{
"asset": "8.8.8.8",
"family": "IPAddress",
"asn": "15169",
"net": "8.8.8.0/24",
"cc": "US",
"rir": "ARIN",
"asname": "GOOGLE - Google LLC, US"
},
{
"asset": "8.8.4.4",
"family": "IPAddress",
"asn": "15169",
"net": "8.8.4.0/24",
"cc": "US",
"rir": "ARIN",
"asname": "GOOGLE - Google LLC, US"
}
]
Options:
-i FILENAME Input file (Default: stdin)
-v Verbose output
--help Show this message and exit.
habu.data.extract.domain
Usage: habu.data.extract.domain [OPTIONS] [INFILE]
Extract valid domains from a file or stdin.
Optionally, check each domain for the presence of NS registers.
Example:
$ cat /var/log/some.log | habu.data.extract.domain -c
google.com
ibm.com
redhat.com
Options:
-c Check if domain has NS servers defined
-v Verbose output
-j JSON output
--help Show this message and exit.
habu.data.extract.email
Usage: habu.data.extract.email [OPTIONS] [INFILE]
Extract email addresses from a file or stdin.
Example:
$ cat /var/log/auth.log | habu.data.extract.email
john@securetia.com
raven@acmecorp.net
nmarks@fimax.com
Options:
-v Verbose output
-j JSON output
--help Show this message and exit.
habu.data.extract.fqdn
Usage: habu.data.extract.fqdn [OPTIONS] [INFILE]
Extract FQDNs (Fully Qualified Domain Names) from a file or stdin.
Example:
$ cat /var/log/some.log | habu.data.extract.fqdn
www.google.com
ibm.com
fileserver.redhat.com
Options:
-c Check if hostname resolves
-v Verbose output
-j JSON output
--help Show this message and exit.
habu.data.extract.ipv4
Usage: habu.data.extract.ipv4 [OPTIONS] [INFILE]
Extract IPv4 addresses from a file or stdin.
Example:
$ cat /var/log/auth.log | habu.data.extract.ipv4
172.217.162.4
23.52.213.96
190.210.43.70
Options:
-j, --json JSON output
-u, --unique Remove duplicates
-v Verbose output
--help Show this message and exit.
habu.data.filter
Usage: habu.data.filter [OPTIONS] FIELD [gt|lt|eq|ne|ge|le|in|contains|defin
ed|undefined|true|false] [VALUE]
Filter data based on operators.
Operator Reference:
gt: Greater than
lt: Lesser than
eq: Equal to
ne: Not equal to
ge: Greather or equal than
le: Lesser or equal than
in: Inside the list of values (or inside the network)
contains: Contains the value (or the network address)
defined: The value is defined
undefined: The value is not defined
true: The value is True
false: The value is False
Example:
$ cat /var/log/auth.log | habu.data.extract.ipv4 | habu.data.enrich | habu.data.filter cc eq US
[
{
"item": "8.8.8.8",
"family": "ipv4_address",
"asn": "15169",
"net": "8.8.8.0/24",
"cc": "US",
"rir": "ARIN",
"asname": "GOOGLE - Google LLC, US"
}
]
Docs: https://fportantier.github.io/hacking-with-habu/user/data-manipulation.html#data-enrichment
Options:
-i FILENAME Input file (Default: stdin)
-v Verbose output
--not Negate the comparison
--help Show this message and exit.
habu.data.select
Usage: habu.data.select [OPTIONS] FIELD
Select a field from a JSON input.
Example:
$ cat /var/log/auth.log | habu.data.extract.ipv4 | habu.data.enrich | habu.data.filter cc eq US | habu.data.select asset
8.8.8.7
8.8.8.8
8.8.8.9
Options:
-i FILENAME Input file (Default: stdin)
-v Verbose output
--json JSON output
--help Show this message and exit.
habu.dhcp.discover
Usage: habu.dhcp.discover [OPTIONS]
Send a DHCP request and show what devices has replied.
Note: Using '-v' you can see all the options (like DNS servers) included
on the responses.
# habu.dhcp_discover
Ether / IP / UDP 192.168.0.1:bootps > 192.168.0.5:bootpc / BOOTP / DHCP
Options:
-i TEXT Interface to use
-t INTEGER Time (seconds) to wait for responses
-v Verbose output
--help Show this message and exit.
habu.dhcp.starvation
Usage: habu.dhcp.starvation [OPTIONS]
Send multiple DHCP requests from forged MAC addresses to fill the DHCP
server leases.
When all the available network addresses are assigned, the DHCP server
don't send responses.
So, some attacks, like DHCP spoofing, can be made.
# habu.dhcp_starvation
Ether / IP / UDP 192.168.0.1:bootps > 192.168.0.6:bootpc / BOOTP / DHCP
Ether / IP / UDP 192.168.0.1:bootps > 192.168.0.7:bootpc / BOOTP / DHCP
Ether / IP / UDP 192.168.0.1:bootps > 192.168.0.8:bootpc / BOOTP / DHCP
Options:
-i TEXT Interface to use
-t INTEGER Time (seconds) to wait for responses
-s INTEGER Time (seconds) between requests
-v Verbose output
--help Show this message and exit.
habu.dns.lookup.forward
Usage: habu.dns.lookup.forward [OPTIONS] HOSTNAME
Perform a forward lookup of a given hostname.
Example:
$ habu.dns.lookup.forward google.com
{
"ipv4": "172.217.168.46",
"ipv6": "2a00:1450:400a:802::200e"
}
Options:
-v Verbose output
--help Show this message and exit.
habu.dns.lookup.reverse
Usage: habu.dns.lookup.reverse [OPTIONS] IP_ADDRESS
Perform a reverse lookup of a given IP address.
Example:
$ $ habu.dns.lookup.reverse 8.8.8.8
{
"hostname": "google-public-dns-a.google.com"
}
Options:
-v Verbose output
--help Show this message and exit.
habu.eicar
Usage: habu.eicar [OPTIONS]
Print the EICAR test string that can be used to test antimalware engines.
More info: http://www.eicar.org/86-0-Intended-use.html
Example:
$ habu.eicar
X5O!P%@AP[4\XZP54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
Options:
--help Show this message and exit.
habu.forkbomb
Usage: habu.forkbomb [OPTIONS] [bash|batch|c|haskell|perl|php|python|ruby]
A shortcut to remember how to use fork bombs in different languages.
Currently supported: bash, batch, c, haskell, perl, php, python, ruby.
Example:
$ habu.forkbomb c
#include <unistd.h>
int main()
{
while(1)
{
fork();
}
return 0;
}
Options:
--help Show this message and exit.
habu.fqdn.finder
Usage: habu.fqdn.finder [OPTIONS] [DOMAINS]...
Uses various techniques to obtain valid FQDNs for the specified domains.
1. Try to all FQDNs with DNS zone transfers
2. Check for Certificate Transparency Logs
3. Connect to specified ports, obtain SSL certificates and get FQDNs from them
4. Connect to websites and get FQDNs based on the website links
5. DNS Brute Force for common names
The results are cleaned to remove FQDNs that does not resolve by DNS
Example:
$ habu.fqdn.finder educacionit.com
barometrosalarial.educacionit.com
blog.educacionit.com
ci.educacionit.com
educacionit.com
intranet.educacionit.com
lecdev.educacionit.com
lecweb.educacionit.com
mail.educacionit.com
plantillas.educacionit.com
www.educacionit.com
Options:
-t FLOAT Time to wait for each connection
-v Verbose output
--debug Debug output
--connect / --no-connect Get from known FQDNs open ports SSL certificates
--brute / --no-brute Run DNS brute force against domains
--links / --no-links Extract FQDNs from web site links
--xfr / --no-xfr Try to do a DNS zone transfer against domains
--ctlog / --no-ctlog Try to get FQDNs from Certificate Transparency
Logs
--json Print the output in JSON format
--help Show this message and exit.
habu.gateway.find
Usage: habu.gateway.find [OPTIONS] NETWORK
Try to reach an external IP using any host has a router.
Useful to find routers in your network.
First, uses arping to detect alive hosts and obtain MAC addresses.
Later, create a network packet and put each MAC address as destination.
Last, print the devices that forwarded correctly the packets.
Example:
# habu.find.gateway 192.168.0.0/24
192.168.0.1 a4:08:f5:19:17:a4 Sagemcom
192.168.0.7 b0:98:2b:5d:22:70 Sagemcom
192.168.0.8 b0:98:2b:5d:1f:e8 Sagemcom
Options:
-i TEXT Interface to use
--host TEXT Host to reach (default: 8.8.8.8)
--tcp Use TCP instead of ICMP
--dport INTEGER RANGE Destination port for TCP (default: 80)
--timeout INTEGER Timeout in seconds (default: 5)
-v Verbose output
--help Show this message and exit.
habu.host
Usage: habu.host [OPTIONS]
Collect information about the host where habu is running.
Example:
$ habu.host
{
"kernel": [
"Linux",
"demo123",
"5.0.6-200.fc29.x86_64",
"#1 SMP Wed Apr 3 15:09:51 UTC 2019",
"x86_64",
"x86_64"
],
"distribution": [
"Fedora",
"29",
"Twenty Nine"
],
"libc": [
"glibc",
"2.2.5"
],
"arch": "x86_64",
"python_version": "3.7.3",
"os_name": "Linux",
"cpu": "x86_64",
"static_hostname": "demo123",
"fqdn": "demo123.lab.sierra"
}
Options:
-v Verbose output.
--help Show this message and exit.
habu.http.headers
Usage: habu.http.headers [OPTIONS] SERVER
Retrieve the HTTP headers of a web server.
Example:
$ habu.http.headers http://duckduckgo.com
{
"Server": "nginx",
"Date": "Sun, 14 Apr 2019 00:00:55 GMT",
"Content-Type": "text/html",
"Content-Length": "178",
"Connection": "keep-alive",
"Location": "https://duckduckgo.com/",
"X-Frame-Options": "SAMEORIGIN",
"Content-Security-Policy": "default-src https: blob: data: 'unsafe-inline' 'unsafe-eval'",
"X-XSS-Protection": "1;mode=block",
"X-Content-Type-Options": "nosniff",
"Referrer-Policy": "origin",
"Expect-CT": "max-age=0",
"Expires": "Mon, 13 Apr 2020 00:00:55 GMT",
"Cache-Control": "max-age=31536000"
}
Options:
-v Verbose output
--help Show this message and exit.
habu.http.options
Usage: habu.http.options [OPTIONS] SERVER
Retrieve the available HTTP methods of a web server.
Example:
$ habu.http.options -v http://google.com
{
"allowed": "GET, HEAD"
}
Options:
-v Verbose output
--help Show this message and exit.
habu.http.tech
Usage: habu.http.tech [OPTIONS] URL
Uses Wappalyzer apps.json database to identify technologies used on a web
application.
Reference: https://github.com/AliasIO/Wappalyzer
Note: This tool only sends one request. So, it's stealth and not
suspicious.
$ habu.web.tech https://woocomerce.com
Google Tag Manager unknown
MySQL unknown
Nginx unknown
PHP unknown
Prototype unknown
RequireJS unknown
WooCommerce 3.8.0
WordPress 5.2.4
Yoast SEO 10.0.1
Options:
--cache / --no-cache
--format [txt|csv|json] Output format
-v Verbose output
--help Show this message and exit.
habu.icmp.ping
Usage: habu.icmp.ping [OPTIONS] IP
The classic ping tool that send ICMP echo requests.
# habu.icmp.ping 8.8.8.8
IP / ICMP 8.8.8.8 > 192.168.0.5 echo-reply 0 / Padding
IP / ICMP 8.8.8.8 > 192.168.0.5 echo-reply 0 / Padding
IP / ICMP 8.8.8.8 > 192.168.0.5 echo-reply 0 / Padding
IP / ICMP 8.8.8.8 > 192.168.0.5 echo-reply 0 / Padding
Options:
-i TEXT Wich interface to use (default: auto)
-c INTEGER How many packets send (default: infinit)
-t INTEGER Timeout in seconds (default: 2)
-w INTEGER How many seconds between packets (default: 1)
-v Verbose
--help Show this message and exit.
habu.ip.asn
Usage: habu.ip.asn [OPTIONS] IP
Use Team Cymru ip2asn service to get information about a public IPv4/IPv6.
Reference: https://www.team-cymru.com/IP-ASN-mapping.html
$ habu.ip.asn 8.8.8.8
{
"asn": "15169",
"net": "8.8.8.0/24",
"cc": "US",
"rir": "ARIN",
"asname": "GOOGLE - Google LLC, US",
"country": "United States"
}
Options:
--help Show this message and exit.
habu.ip.geolocation
Usage: habu.ip.geolocation [OPTIONS] IP_ADDRESS
Get the geolocation of an IP adddress from https://ipapi.co/.
Example:
$ habu.ip.geolocation 8.8.8.8
{
"ip": "8.8.8.8",
"city": "Mountain View",
...
"asn": "AS15169",
"org": "Google LLC"
}
Options:
-v Verbose output.
--help Show this message and exit.
habu.ip.internal
Usage: habu.ip.internal [OPTIONS]
Get the local IP address(es) of the local interfaces.
Example:
$ habu.ip.internal
{
"lo": {
"ipv4": [
{
"addr": "127.0.0.1",
"netmask": "255.0.0.0",
"peer": "127.0.0.1"
}
],
"link_layer": [
{
"addr": "00:00:00:00:00:00",
"peer": "00:00:00:00:00:00"
}
],
"ipv6": [
{
"addr": "::1",
"netmask": "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128"
}
]
},
...
Options:
-v Verbose output.
--help Show this message and exit.
habu.ip.public
Usage: habu.ip.public [OPTIONS]
Get the public IP address of the connection from https://api.ipify.org.
Example:
$ habu.ip.public
80.219.53.185
Options:
-4, --ipv4 Print your public IPv4 address (default)
-6, --ipv6 Print your public IPv6 address
-j, --json Print the output in JSON format
--help Show this message and exit.
habu.karma
Usage: habu.karma [OPTIONS] HOST
Use the Karma service https://karma.securetia.com to check an IP against
various Threat Intelligence / Reputation lists.
$ habu.karma www.google.com
www.google.com -> 64.233.190.99
[
"hphosts_fsa",
"hphosts_psh",
"hphosts_emd"
]
Note: You can use the hostname or the IP of the host to query.
Options:
--help Show this message and exit.
habu.karma.bulk
Usage: habu.karma.bulk [OPTIONS] [INFILE]
Show which IP addresses are inside blacklists using the Karma online
service.
Example:
$ cat /var/log/auth.log | habu.extract.ipv4 | habu.karma.bulk
172.217.162.4 spamhaus_drop,alienvault_spamming
23.52.213.96 CLEAN
190.210.43.70 alienvault_malicious
Options:
--json JSON output
--bad Show only entries in blacklists
-v Verbose output
--help Show this message and exit.
habu.land
Usage: habu.land [OPTIONS] IP
This command implements the LAND attack, that sends packets forging the
source IP address to be the same that the destination IP. Also uses the
same source and destination port.
The attack is very old, and can be used to make a Denial of Service on old
systems, like Windows NT 4.0. More information here:
https://en.wikipedia.org/wiki/LAND
# sudo habu.land 172.16.0.10
............
Note: Each dot (.) is a sent packet. You can specify how many packets send
with the '-c' option. The default is never stop. Also, you can specify the
destination port, with the '-p' option.
Options:
-c INTEGER How many packets send (default: infinit)
-p INTEGER Port to use (default: 135)
-i TEXT Interface to use
-v Verbose
--help Show this message and exit.
habu.nc
Usage: habu.nc [OPTIONS] HOST PORT
Some kind of netcat/ncat replacement.
The execution emulates the feeling of this popular tools.
Example:
$ habu.nc --crlf www.portantier.com 80
Connected to 45.77.113.133 80
HEAD / HTTP/1.0
HTTP/1.0 301 Moved Permanently
Date: Thu, 26 Jul 2018 21:10:51 GMT
Server: OpenBSD httpd
Connection: close
Content-Type: text/html
Content-Length: 443
Location: https://www.portantier.com/
Options:
--family [4|6|46] IP Address Family
--ssl Enable SSL
--crlf Use CRLF for EOL sequence
--protocol [tcp|udp] Layer 4 protocol to use
--source-ip TEXT Source IP to use
--source-port INTEGER RANGE Source port to use
--help Show this message and exit.
habu.net.contest
Usage: habu.net.contest [OPTIONS]
Try to connect to various services and check if can reach them using your
internet connection.
Example:
$ habu.net.contest
DNS: True
FTP: True
SSH: True
HTTP: True
HTTPS: True
Options:
--help Show this message and exit.
habu.net.interfaces
Usage: habu.net.interfaces [OPTIONS]
Show the network interfaces available on the system.
Example:
# habu.interfaces
# NAME MAC INET INET6
0 eth0 80:fa:5b:4b:f9:18 None None
1 lo 00:00:00:00:00:00 127.0.0.1 ::1
2 wlan0 f4:96:34:e5:ae:1b 192.168.0.6 None
3 vboxnet0 0a:00:27:00:00:00 192.168.56.1 fe80::800:27ff:fe00:0
Options:
-j Output in JSON format
--help Show this message and exit.
habu.nmap.excluded
Usage: habu.nmap.excluded [OPTIONS]
Prints a random port that is not present on nmap-services file so is not
scanned automatically by nmap.
Useful for services like SSH or RDP, that are continuously scanned on
their default ports.
Example:
# habu.nmap.excluded
58567
Options:
-l INTEGER RANGE Lowest port to consider
-h INTEGER RANGE Highest port to consider
--help Show this message and exit.
habu.nmap.open
Usage: habu.nmap.open [OPTIONS] SCANFILE
Read an nmap report and print the open ports.
Print the ports that has been resulted open reading the generated nmap
output.
You can use it to rapidly reutilize the port list for the input of other
tools.
Supports and detects the 3 output formats (nmap, gnmap and xml)
Example:
# habu.nmap.open portantier.nmap
22,80,443
Options:
-p [tcp|udp|sctp] The protocol (default=tcp)
--help Show this message and exit.
habu.nmap.ports
Usage: habu.nmap.ports [OPTIONS] SCANFILE
Read an nmap report and print the tested ports.
Print the ports that has been tested reading the generated nmap output.
You can use it to rapidly reutilize the port list for the input of other
tools.
Supports and detects the 3 output formats (nmap, gnmap and xml)
Example:
# habu.nmap.ports portantier.nmap
21,22,23,80,443
Options:
-p [tcp|udp|sctp] The protocol (default=tcp)
--help Show this message and exit.
habu.protoscan
Usage: habu.protoscan [OPTIONS] IP
Send IP packets with different protocol field content to guess what layer
4 protocols are available.
The output shows which protocols doesn't generate a 'protocol-unreachable'
ICMP response.
Example:
$ sudo python cmd_ipscan.py 45.77.113.133
1 icmp
2 igmp
4 ipencap
6 tcp
17 udp
41 ipv6
47 gre
50 esp
51 ah
58 ipv6_icmp
97 etherip
112 vrrp
115 l2tp
132 sctp
137 mpls_in_ip
Options:
-i TEXT Interface to use
-t INTEGER Timeout for each probe (default: 2 seconds)
--all Probe all protocols (default: Defined in /etc/protocols)
-v Verbose output
--help Show this message and exit.
habu.server.ftp
Usage: habu.server.ftp [OPTIONS]
Basic fake FTP server, whith the only purpose to steal user credentials.
Supports SSL/TLS.
Example:
# sudo habu.server.ftp --ssl --ssl-cert /tmp/cert.pem --ssl-key /tmp/key.pem
Listening on port 21
Accepted connection from ('192.168.0.27', 56832)
Credentials collected from 192.168.0.27! fabian 123456
Options:
-a TEXT Address to bind (default: all)
-p INTEGER Which port to use (default: 21)
--ssl Enable SSL/TLS (default: False)
--ssl-cert TEXT SSL/TLS Cert file
--ssl-key TEXT SSL/TLS Key file
-v Verbose
--help Show this message and exit.
habu.shodan
Usage: habu.shodan [OPTIONS] IP
Simple shodan API client.
Prints the JSON result of a shodan query.
Example:
$ habu.shodan 216.58.222.36
asn AS15169
isp Google
hostnames eze04s06-in-f4.1e100.net, gru09s17-in-f36.1e100.net
country_code US
region_code CA
city Mountain View
org Google
open_ports tcp/443, tcp/80
Options:
--cache / --no-cache
-v Verbose output
--format [txt|csv|json|nmap] Output format
--help Show this message and exit.
habu.shodan.query
Usage: habu.shodan.query [OPTIONS] QUERY
Simple shodan API client.
Prints the JSON result of a shodan query.
Example:
$ habu.shodan 8.8.8.8
{
"hostnames": [
"google-public-dns-a.google.com"
],
"country_code": "US",
"org": "Google",
"data": [
{
"isp": "Google",
"transport": "udp",
"data": "Recursion: enabled",
"asn": "AS15169",
"port": 53,
"hostnames": [
"google-public-dns-a.google.com"
]
}
],
"ports": [
53
]
}
Options:
-c Disable cache
-v Verbose output
-o FILENAME Output file (default: stdout)
--help Show this message and exit.
habu.tcp.flags
Usage: habu.tcp.flags [OPTIONS] IP
Send TCP packets with different flags and tell what responses receives.
It can be used to analyze how the different TCP/IP stack implementations
and configurations responds to packet with various flag combinations.
Example:
# habu.tcp_flags www.portantier.com
S -> SA
FS -> SA
FA -> R
SA -> R
By default, the command sends all possible flag combinations. You can
specify which flags must ever be present (reducing the quantity of
possible combinations), with the option '-f'.
Also, you can specify which flags you want to be present on the response
packets to show, with the option '-r'.
With the next command, you see all the possible combinations that have the
FIN (F) flag set and generates a response that contains the RST (R) flag.
Example:
# habu.tcp_flags -f F -r R www.portantier.com
FPA -> R
FSPA -> R
FAU -> R
Options:
-p INTEGER Port to use (default: 80)
-f TEXT Flags that must be sent ever (default: fuzz with all flags)
-r TEXT Filter by response flags (default: show all responses)
-v Verbose
--first Stop on first response that matches
--help Show this message and exit.
habu.tcp.isn
Usage: habu.tcp.isn [OPTIONS] IP
Create TCP connections and print the TCP initial sequence numbers for each
one.
$ sudo habu.tcp.isn -c 5 www.portantier.com
1962287220
1800895007
589617930
3393793979
469428558
Note: You can get a graphical representation (needs the matplotlib
package) using the '-g' option to better understand the randomness.
Options:
-p INTEGER Port to use (default: 80)
-c INTEGER How many packets to send/receive (default: 5)
-i TEXT Interface to use
-g Graph (requires matplotlib)
-v Verbose output
--help Show this message and exit.
habu.tcp.scan
Usage: habu.tcp.scan [OPTIONS] IP
TCP Port Scanner.
Print the ports that generated a response with the SYN flag or (if show
use -a) all the ports that generated a response.
It's really basic compared with nmap, but who is comparing?
Example:
# habu.tcp.scan -p 22,23,80,443 -s 1 45.77.113.133
22 S -> SA
80 S -> SA
443 S -> SA
Options:
-p TEXT Ports to use (default: 80) example: 20-23,80,135
-i TEXT Interface to use
-f TEXT Flags to use (default: S)
-s TEXT Time between probes (default: send all together)
-t INTEGER Timeout for each probe (default: 2 seconds)
-a Show all responses (default: Only containing SYN flag)
-v Verbose output
--help Show this message and exit.
habu.tcp.synflood
Usage: habu.tcp.synflood [OPTIONS] IP
Launch a lot of TCP connections and keeps them opened.
Some very old systems can suffer a Denial of Service with this.
Reference: https://en.wikipedia.org/wiki/SYN_flood
Example:
# sudo habu.tcp.synflood 172.16.0.10
.................
Each dot is a packet sent.
You can use the options '-2' and '-3' to forge the layer 2/3 addresses.
If you use them, each connection will be sent from a random layer2 (MAC)
and/or layer3 (IP) address.
You can choose the number of connections to create with the option '-c'.
The default is never stop creating connections.
Note: If you send the packets from your real IP address and you want to
keep the connections half-open, you need to setup for firewall to don't
send the RST packets.
Options:
-i TEXT Wich interface to use (default: auto)
-c INTEGER How many packets send (default: infinit)
-p INTEGER Port to use (default: 135)
-2 Forge layer2/MAC address (default: No)
-3 Forge layer3/IP address (default: No)
-v Verbose
--help Show this message and exit.
habu.traceroute
Usage: habu.traceroute [OPTIONS] IP
TCP traceroute.
Identify the path to a destination getting the ttl-zero-during-transit
messages.
Note: On the internet, you can have various valid paths to a device.
Example:
# habu.traceroute 45.77.113.133
IP / ICMP 192.168.0.1 > 192.168.0.5 time-exceeded ttl-zero-during-transit / IPerror / TCPerror
IP / ICMP 10.242.4.197 > 192.168.0.5 time-exceeded ttl-zero-during-transit / IPerror / TCPerror / Padding
IP / ICMP 200.32.127.98 > 192.168.0.5 time-exceeded ttl-zero-during-transit / IPerror / TCPerror / Padding
.
IP / ICMP 4.16.180.190 > 192.168.0.5 time-exceeded ttl-zero-during-transit / IPerror / TCPerror
.
IP / TCP 45.77.113.133:http > 192.168.0.5:ftp_data SA / Padding
Note: It's better if you use a port that is open on the remote system.
Options:
-p INTEGER Port to use (default: 80)
-i TEXT Interface to use
--help Show this message and exit.
habu.upgrade
Usage: habu.upgrade [OPTIONS]
Upgrade habu (from https://github.com/fportantier/habu)
Options:
--help Show this message and exit.
habu.usercheck
Usage: habu.usercheck [OPTIONS] USERNAME
Check if the given username exists on various social networks and other
popular sites.
$ habu.usercheck portantier
{
"aboutme": "https://about.me/portantier",
"disqus": "https://disqus.com/by/portantier/",
"github": "https://github.com/portantier/",
"ifttt": "https://ifttt.com/p/portantier",
"lastfm": "https://www.last.fm/user/portantier",
"medium": "https://medium.com/@portantier",
"pastebin": "https://pastebin.com/u/portantier",
"pinterest": "https://in.pinterest.com/portantier/",
"twitter": "https://twitter.com/portantier",
"vimeo": "https://vimeo.com/portantier"
}
Options:
-c Disable cache
-v Verbose output
-w Open each valid url in a webbrowser
--help Show this message and exit.
habu.version
Usage: habu.version [OPTIONS]
Options:
--help Show this message and exit.
habu.vhosts
Usage: habu.vhosts [OPTIONS] HOST
Use Bing to query the websites hosted on the same IP address.
$ habu.vhosts www.telefonica.com
www.telefonica.com -> 212.170.36.79
[
'www.telefonica.es',
'universitas.telefonica.com',
'www.telefonica.com',
]
Options:
-c Disable cache
-p INTEGER Pages count (Default: 10)
-f INTEGER First result to get (Default: 1)
--help Show this message and exit.
habu.virustotal
Usage: habu.virustotal [OPTIONS] INPUT
Send a file to VirusTotal https://www.virustotal.com/ and print the report
in JSON format.
Note: Before send a file, will check if the file has been analyzed before
(sending the sha256 of the file), if a report exists, no submission will
be made, and you will see the last report.
$ habu.virustotal meterpreter.exe
Verifying if hash already submitted: f4826b219aed3ffdaa23db26cfae611979bf215984fc71a1c12f6397900cb70d
Sending file for analysis
Waiting/retrieving the report...
{
"md5": "0ddb015b5328eb4d0cc2b87c39c49686",
"permalink": "https://www.virustotal.com/file/c9a2252b491641e15753a4d0c4bb30b1f9bd26ecff2c74f20a3c7890f3a1ea23/analysis/1526850717/",
"positives": 49,
"resource": "c9a2252b491641e15753a4d0c4bb30b1f9bd26ecff2c74f20a3c7890f3a1ea23",
"response_code": 1,
"scan_date": "2018-05-20 21:11:57",
"scan_id": "c9a2252b491641e15753a4d0c4bb30b1f9bd26ecff2c74f20a3c7890f3a1ea23-1526850717",
"scans": {
"ALYac": {
"detected": true,
"result": "Trojan.CryptZ.Gen",
"update": "20180520",
"version": "1.1.1.5"
},
... The other scanners ...
},
"sha1": "5fa33cab1729480dd023b08f7b91a945c16d0a9e",
"sha256": "c9a2252b491641e15753a4d0c4bb30b1f9bd26ecff2c74f20a3c7890f3a1ea23",
"total": 67,
"verbose_msg": "Scan finished, information embedded"
}
Options:
-v Verbose output
--help Show this message and exit.
habu.web.report
Usage: habu.web.report [OPTIONS] [INPUT_FILE]
Makes a report that includes HTTP headers of websites.
Optionally, uses Firefox or Chromium to take a screenshot of the websites.
The expected format is one url per line.
Creates a directory called 'report' with the content inside.
$ echo https://www.portantier.com | habu.web.report
Options:
-v Verbose output
-s Take a screenshot for each website
-b [firefox|chromium-browser] Browser to use for screenshot.
--help Show this message and exit.
habu.web.screenshot
Usage: habu.web.screenshot [OPTIONS] URL
Uses Firefox or Chromium to take a screenshot of the website.
$ habu.web.screenshot https://www.portantier.com
Options:
-b [firefox|chromium-browser] Browser to use for screenshot.
-o TEXT Output file. (default: screenshot.png)
--help Show this message and exit.
habu.whois.domain
Usage: habu.whois.domain [OPTIONS] DOMAIN
Simple whois client to check domain names.
Example:
$ habu.whois.domain google.com
registrar MarkMonitor, Inc.
whois_server whois.markmonitor.com
creation_date 1997-09-15 04:00:00
expiration_date 2028-09-14 04:00:00
name_servers ns1.google.com, ns2.google.com, ns3.google.com, ns4.google.com
emails abusecomplaints@markmonitor.com, whoisrequest@markmonitor.com
dnssec unsigned
org Google LLC
country US
state CA
Options:
--json Print the output in JSON format
--csv Print the output in CSV format
--help Show this message and exit.
habu.whois.ip
Usage: habu.whois.ip [OPTIONS] IP
Simple whois client to check IP addresses (IPv4 and IPv6).
Example:
$ habu.whois.ip 8.8.4.4
asn 15169
asn_registry arin
asn_cidr 8.8.4.0/24
asn_country_code US
asn_description GOOGLE - Google LLC, US
asn_date 1992-12-01
Options:
--json Print the output in JSON format
--csv Print the output in CSV format
--help Show this message and exit.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distributions
Built Distribution
File details
Details for the file habu-0.1.39-py3-none-any.whl
.
File metadata
- Download URL: habu-0.1.39-py3-none-any.whl
- Upload date:
- Size: 596.1 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/1.13.0 pkginfo/1.4.2 requests/2.21.0 setuptools/40.8.0 requests-toolbelt/0.8.0 tqdm/4.28.1 CPython/3.7.3
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 3edec88015261144dce0f142669eb4428b6072d0b722ea226f1fa4c337ae2560 |
|
MD5 | ff27bcb9a92bf4ccdd8de3d6040b9fa5 |
|
BLAKE2b-256 | b936c1417eb7e5f2d0f4f9ab4b56b38f64aafa20b7d96c572e56a98ac1319c8c |