Skip to content

Commit 692556d

Browse files
authored
Add files via upload
1 parent f6ac203 commit 692556d

9 files changed

+160
-56
lines changed

_plugins/entysec.rb

+80
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,80 @@
1+
require 'rouge'
2+
3+
module Rouge
4+
module Tokens
5+
def self.token(name, shortname, &b)
6+
tok = Token.make_token(name, shortname, &b)
7+
const_set(name, tok)
8+
end
9+
10+
SHORTNAME = 'z'
11+
12+
token :EntySec, SHORTNAME do
13+
token :Prompt, "#{SHORTNAME}p"
14+
token :Error, "#{SHORTNAME}e"
15+
token :Good, "#{SHORTNAME}g"
16+
token :Status, "#{SHORTNAME}s"
17+
token :Warning, "#{SHORTNAME}w"
18+
token :Info, "#{SHORTNAME}i"
19+
end
20+
end
21+
22+
module Lexers
23+
class EntySecConsoleLanguage < Rouge::RegexLexer
24+
title 'entysec'
25+
tag 'entysec'
26+
desc 'EntySec Console Highlighter'
27+
filenames []
28+
mimetypes []
29+
30+
def self.keywords
31+
@keywords ||= Set.new %w()
32+
end
33+
34+
state :whitespace do
35+
rule %r/\s+/, Text
36+
end
37+
38+
state :root do
39+
mixin :whitespace
40+
41+
rule %r{^(pwny:)}, Text, :pwny_prompt
42+
rule %r{^\[-\]}, Tokens::EntySec::Error
43+
rule %r{^\[\+\]}, Tokens::EntySec::Good
44+
rule %r{^\[\*\]}, Tokens::EntySec::Status
45+
rule %r{^\[\!\]}, Tokens::EntySec::Warning
46+
rule %r{^(\[i\]|\[\?\]|\[>\])}, Tokens::EntySec::Info
47+
rule %r{^(\[)}, Text, :hsf_prompt
48+
rule %r{^(\()}, Text, :regular_prompt
49+
rule %r{.+}, Text
50+
end
51+
52+
state :regular_prompt do
53+
mixin :whitespace
54+
55+
rule %r{ghost|seashell}, Tokens::EntySec::Prompt
56+
rule %r{\)}, Punctuation
57+
rule %r{>}, Punctuation, :pop!
58+
end
59+
60+
state :hsf_prompt do
61+
mixin :whitespace
62+
63+
rule %r{hsf\d?}, Tokens::EntySec::Warning
64+
rule %r{exploit|auxiliary|post}, Text
65+
rule %r{:}, Punctuation
66+
rule %r{\]}, Punctuation
67+
rule %r{[\w/]+}, Tokens::EntySec::Error
68+
rule %r{>}, Punctuation, :pop!
69+
end
70+
71+
state :pwny_prompt do
72+
mixin :whitespace
73+
74+
rule %r{(/[\w/]*)(?=\s)}, Tokens::EntySec::Prompt
75+
rule %r{(\w+)}, Tokens::EntySec::Status
76+
rule %r{\$|\#}, Punctuation, :pop!
77+
end
78+
end
79+
end
80+
end

assets/css/main.css

+6-6
Original file line numberDiff line numberDiff line change
@@ -2,26 +2,26 @@
22
text-transform: inherit;
33
}
44

5-
.language-hsf .zp {
5+
.language-entysec .zp {
66
text-decoration: underline;
77
}
88

9-
.language-hsf .ze {
9+
.language-entysec .ze {
1010
color: #960050;
1111
}
1212

13-
.language-hsf .zg {
13+
.language-entysec .zg {
1414
color: #859900;
1515
}
1616

17-
.language-hsf .zs {
17+
.language-entysec .zs {
1818
color: #268bd2;
1919
}
2020

21-
.language-hsf .zi {
21+
.language-entysec .zi {
2222
font-weight: bold;
2323
}
2424

25-
.language-hsf .zw {
25+
.language-entysec .zw {
2626
color: orange;
2727
}

docs/getting-started/hatsploit-modules.md

+29-18
Original file line numberDiff line numberDiff line change
@@ -5,24 +5,34 @@ parent: Getting started
55
nav_order: 5
66
---
77

8-
## About Modules
8+
Since HatSploit Framework is built aroung a modular system, all the additional functional including exploits, tools or post-exploitation capabilities are implemented within modules.
99

10-
Since HatSploit Framework has a modular system, all the additional functional including exploits, tools or post-exploitation capabilities are implemented within modules.
10+
There are the categories that are commonly used:
1111

12-
Modules can be different. They can scan the target for opened ports, exploit security flaws or spoof the traffic.
12+
* *Auxiliary* - Module provides scanning functionality and only interacts with the target by scanning it.
13+
* *Exploit* - Module provides an exploit for a specific vulnerability and can be used to exploit it and gain any type of access if used with payload or for DoS, information disclosure and any other impact.
14+
* *Post* - Module provides a post-exploitation functionality and used when the access to the target system is gained (by exploit module for example).
15+
16+
In short, modules can be different. They can scan the target for opened ports, exploit security flaws or spoof the traffic.
1317

1418
## Using the module
1519

16-
To use specific module, just type `use` and module name.
20+
To use specific module, just type `use` and provide module name or index as an argument.
1721

18-
```hsf
22+
```entysec
1923
[hsf3]> use exploit/linux/rompager/multi_password_disclosure
2024
[hsf3: RomPager Multi Password Disclosure]>
2125
```
2226

23-
**NOTE:** You can use the module by its number from `search` or `show` lists.
27+
{: .note }
28+
An argument for `use` command can be an index as mentioned above. This index can be obtained for the table produced by `search` or any other command that retrieves module list.
29+
30+
When used, module information can be fetched with `info` command. It provides various descriptions, module authors, references and side effects (if specified).
31+
32+
{: .note }
33+
`info` command can also be used with a module name or index as an argument. So in order to obtain module information it is not always required to switch to this module.
2434

25-
```hsf
35+
```entysec
2636
[hsf3: RomPager Multi Password Disclosure]> info
2737
2838
Name: RomPager Multi Password Disclosure
@@ -46,13 +56,14 @@ References:
4656
EDB: 33803
4757
```
4858

49-
Here we also used `info` command to obtain the general module information.
59+
The module selected as an example is an *exploit* for `RomPager 4.07` server-side software. It attempts to obtain credentials by sending a malicious requiest to the specified target.
5060

51-
The module we just selected is an exploit for `RomPager 4.07` server. It takes few options and then tries to obtain credentials.
61+
Any module can be configured by a set of options that are predefined by a module author. Different modules have different options and they vary from module to module. Module options can be listed with `show options` (or shorter form - `options`) and can be set by `set` command. Module can also include advanced options that are hidden by default. They are optional and typically used only when high level of configuration is requied. These options can be displayed by `show advanced` command.
5262

53-
You can list module options using `options` command and list advanced options using `advanced` command.
63+
{: .note }
64+
`unset` command can be invoked to empty the option value.
5465

55-
```hsf
66+
```entysec
5667
[hsf7: exploit: RomPager Multi Password Disclosure]> options
5768
5869
Module Options (exploit/linux/rompager/multi_password_disclosure):
@@ -64,18 +75,14 @@ Module Options (exploit/linux/rompager/multi_password_disclosure):
6475
ssl no no Use SSL.
6576
timeout 10 no Connection timeout.
6677
username admin yes Default username.
67-
```
68-
69-
Options can be set using `set` command and can be set to `None` using `unset`.
7078
71-
```hsf
7279
[hsf7: exploit: RomPager Multi Password Disclosure]> set host 192.168.1.56
7380
[i] host => 192.168.1.56
7481
```
7582

76-
Finally, to execute the module, you should use command `run`.
83+
After all the configuration steps are completed, module can be executed by `run` command.
7784

78-
```hsf
85+
```entysec
7986
[hsf7: exploit: RomPager Multi Password Disclosure]> run
8087
8188
@@ -88,7 +95,11 @@ Credentials:
8895
[+] Exploit module completed!
8996
```
9097

91-
**NOTE:** If you want to run module as a background job, use `run -j`.
98+
{: .note }
99+
There are different variations of `run` command. For example: `exploit`, `start` and `execute` - they are all just shortcuts.
100+
101+
{: .note }
102+
If you want to run module as a background job while switching to the next task, use `run -j`. In you want module to execute in loop, use `run -l`.
92103

93104
## Developing the module
94105

docs/getting-started/hatsploit-payloads.md

+14-6
Original file line numberDiff line numberDiff line change
@@ -5,19 +5,23 @@ parent: Getting started
55
nav_order: 6
66
---
77

8-
## About payloads
8+
After the successful exploitation, *exploit* module should have something to send in order to get a remote shell or any other kind of impact. This is where payloads come in action. HatSploit provides an extensive interface for payload development and supports all kinds of them:
99

10-
HatSploit payloads are sent to the target after successful exploitation of vulnerability by module.
10+
* *Shellcodes* - These payloads are highly architecture dependent due to that they are written in pure assembly. HatSploit enables payload authors to store payloads in assembly code rather then publishing compiled shellcodes.
11+
* *Scripts* - These payloads can be any script, from BASH, Python or PowerShell code to a single command.
1112

12-
They can differ, from platform and style to architecture and execution.
13+
All payloads are different and are created for different purposes, however HatSploit has a strict payload system to distinguish them. There are two types of payload:
14+
15+
* *Stager* - Payload that is sent first and the main purpose of which is to read the next (bigger) payload into memory and execute it.
16+
* *Staged* - Payload that can be sent by itself or after the stager. This payload is flexible and can contain multiple ways it can be executed, while *stager* has only one.
1317

1418
## Using payloads
1519

1620
To use a specific payload, you should first select the module that supports payload execution.
1721

1822
Let's take `exploit/linux/skybridge/100_110_code_execution` module that exploits the built-in backdoor in several routers and attempts to gain code execution.
1923

20-
```hsf
24+
```entysec
2125
[hsf3]> search skybridge
2226
2327
Modules:
@@ -50,7 +54,7 @@ Payload Options (linux/armle/shell_reverse_tcp):
5054

5155
As you can see, we already have a payload preconfigured for us to use on an exploited system. You can invoke `info` command to find more information about the effects of the module.
5256

53-
```hsf
57+
```entysec
5458
[hsf3: SkyBridge MB-A100/110 Remote Code Execution]> info
5559
5660
Name: SkyBridge MB-A100/110 Remote Code Execution
@@ -83,4 +87,8 @@ Stability:
8387
8488
Reliability:
8589
Module spawns weak (unstable) session
86-
```
90+
```
91+
92+
## Developing the payload
93+
94+
If you want to contribute and develop your own payload, you might find this guide useful - [Writing Payloads](/docs/development/writing-payloads)

docs/getting-started/hatsploit-plugins.md

+13-8
Original file line numberDiff line numberDiff line change
@@ -13,16 +13,17 @@ If you are interested in learning how to develop and write your own plugins for
1313

1414
To demonstrate how plugins work, let’s try loading one of the fun plugins included with HatSploit – `cowsay`. The framework provides a dedicated `load` command for this purpose, and its usage is quite simple:
1515

16-
```hsf
16+
```entysec
1717
[hsf]> load
1818
Usage: load <plugin|number>
1919
```
2020

21-
**Note:** Plugins can be loaded either by their name or by their number, as listed in the output of `search` or `show` commands.
21+
{: .note }
22+
An argument for `load` command can be an index as mentioned above. This index can be obtained for the table produced by `search` or any other command that retrieves plugin list.
2223

2324
When you load the `cowsay` plugin, the following amusing cow message will appear:
2425

25-
```hsf
26+
```entysec
2627
[hsf]> load cowsay
2728
[*] Loading cowsay plugin...
2829
________________
@@ -40,17 +41,16 @@ When you load the `cowsay` plugin, the following amusing cow message will appear
4041

4142
Once the plugin is loaded, it adds a new command to the main HatSploit interface.
4243

43-
```hsf
44+
```entysec
4445
Cowsay Commands:
4546
4647
Command Description
47-
------- -----------
4848
cowsay Ask the cow to say a message.
4949
```
5050

5151
Now, executing the newly available `cowsay` command with the argument `HatSploit is Great` will produce the following output:
5252

53-
```hsf
53+
```entysec
5454
[hsf]> cowsay 'HatSploit is Great'
5555
____________________
5656
< HatSploit is Great >
@@ -66,13 +66,18 @@ Now, executing the newly available `cowsay` command with the argument `HatSploit
6666

6767
When you no longer need a plugin, you can free up space by unloading it using the `unload` command:
6868

69-
```hsf
69+
```entysec
7070
[hsf]> unload
7171
Usage: unload <plugin|number>
7272
```
7373

74-
**Note:** Just like with the `load` command, plugins can be unloaded by their name or their corresponding number from the `search` or `show` lists.
74+
{: .note }
75+
An argument for `unload` command can be an index as mentioned above. This index can be obtained for the table produced by `search` or any other command that retrieves plugin list.
7576

7677
## Discovering more plugins
7778

7879
If you are eager to explore and utilize additional plugins, a more comprehensive collection can be found here - [HatSploit Plugins](/docs/plugins).
80+
81+
## Developing the plugin
82+
83+
If you want to contribute and develop your own plugin, you might find this guide useful - [Writing Plugins](/docs/development/writing-plugins)

docs/getting-started/hatsploit-script.md

+5-4
Original file line numberDiff line numberDiff line change
@@ -7,11 +7,11 @@ nav_order: 8
77

88
HatSploit has the ability to execute interface commands from the given file.
99

10-
## Writing Script
10+
## Writing script
1111

12-
I'll create `dirscan.hsf` file, it will be a HatSploit script that scans all directories on `127.0.0.1:8080`.
12+
The HatSploit script provided below scans all directories at `http://127.0.0.1:8080/`.
1313

14-
```
14+
```entysec
1515
use auxiliary/generic/scanner/directory_scanner
1616
set host 127.0.0.1
1717
set port 8080
@@ -22,4 +22,5 @@ And after I wrote this simple script, I'll execute it with HatSploit.
2222

2323
> hsf -s script.hsf
2424
25-
**NOTE:** If you do not want to exit after script execution completed, just use `--no-exit` argument.
25+
{: .note }
26+
If you do not want to exit after script execution completed, just use `--no-exit` argument.

docs/getting-started/installation.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
22
layout: default
33
title: Installation
4-
parent: Getting Started
4+
parent: Getting started
55
nav_order: 1
66
---
77

88
This guide provides step-by-step instructions on setting up the required components and installing the HatSploit Framework on your system.
99

10-
## System Requirements
10+
## System requirements
1111

1212
Before proceeding with the installation, please ensure your system meets the following basic requirements:
1313

0 commit comments

Comments
 (0)