You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: docs/getting-started/hatsploit-modules.md
+29-18
Original file line number
Diff line number
Diff line change
@@ -5,24 +5,34 @@ parent: Getting started
5
5
nav_order: 5
6
6
---
7
7
8
-
## About Modules
8
+
Since HatSploit Framework is built aroung a modular system, all the additional functional including exploits, tools or post-exploitation capabilities are implemented within modules.
9
9
10
-
Since HatSploit Framework has a modular system, all the additional functional including exploits, tools or post-exploitation capabilities are implemented within modules.
10
+
There are the categories that are commonly used:
11
11
12
-
Modules can be different. They can scan the target for opened ports, exploit security flaws or spoof the traffic.
12
+
**Auxiliary* - Module provides scanning functionality and only interacts with the target by scanning it.
13
+
**Exploit* - Module provides an exploit for a specific vulnerability and can be used to exploit it and gain any type of access if used with payload or for DoS, information disclosure and any other impact.
14
+
**Post* - Module provides a post-exploitation functionality and used when the access to the target system is gained (by exploit module for example).
15
+
16
+
In short, modules can be different. They can scan the target for opened ports, exploit security flaws or spoof the traffic.
13
17
14
18
## Using the module
15
19
16
-
To use specific module, just type `use` and module name.
20
+
To use specific module, just type `use` and provide module name or index as an argument.
17
21
18
-
```hsf
22
+
```entysec
19
23
[hsf3]> use exploit/linux/rompager/multi_password_disclosure
20
24
[hsf3: RomPager Multi Password Disclosure]>
21
25
```
22
26
23
-
**NOTE:** You can use the module by its number from `search` or `show` lists.
27
+
{: .note }
28
+
An argument for `use` command can be an index as mentioned above. This index can be obtained for the table produced by `search` or any other command that retrieves module list.
29
+
30
+
When used, module information can be fetched with `info` command. It provides various descriptions, module authors, references and side effects (if specified).
31
+
32
+
{: .note }
33
+
`info` command can also be used with a module name or index as an argument. So in order to obtain module information it is not always required to switch to this module.
24
34
25
-
```hsf
35
+
```entysec
26
36
[hsf3: RomPager Multi Password Disclosure]> info
27
37
28
38
Name: RomPager Multi Password Disclosure
@@ -46,13 +56,14 @@ References:
46
56
EDB: 33803
47
57
```
48
58
49
-
Here we also used `info` command to obtain the general module information.
59
+
The module selected as an example is an *exploit* for `RomPager 4.07` server-side software. It attempts to obtain credentials by sending a malicious requiest to the specified target.
50
60
51
-
The module we just selected is an exploit for `RomPager 4.07` server. It takes few options and then tries to obtain credentials.
61
+
Any module can be configured by a set of options that are predefined by a module author. Different modules have different options and they vary from module to module. Module options can be listed with `show options` (or shorter form - `options`) and can be set by `set` command. Module can also include advanced options that are hidden by default. They are optional and typically used only when high level of configuration is requied. These options can be displayed by `show advanced` command.
52
62
53
-
You can list module options using `options` command and list advanced options using `advanced` command.
63
+
{: .note }
64
+
`unset` command can be invoked to empty the option value.
54
65
55
-
```hsf
66
+
```entysec
56
67
[hsf7: exploit: RomPager Multi Password Disclosure]> options
Copy file name to clipboardexpand all lines: docs/getting-started/hatsploit-payloads.md
+14-6
Original file line number
Diff line number
Diff line change
@@ -5,19 +5,23 @@ parent: Getting started
5
5
nav_order: 6
6
6
---
7
7
8
-
## About payloads
8
+
After the successful exploitation, *exploit* module should have something to send in order to get a remote shell or any other kind of impact. This is where payloads come in action. HatSploit provides an extensive interface for payload development and supports all kinds of them:
9
9
10
-
HatSploit payloads are sent to the target after successful exploitation of vulnerability by module.
10
+
**Shellcodes* - These payloads are highly architecture dependent due to that they are written in pure assembly. HatSploit enables payload authors to store payloads in assembly code rather then publishing compiled shellcodes.
11
+
**Scripts* - These payloads can be any script, from BASH, Python or PowerShell code to a single command.
11
12
12
-
They can differ, from platform and style to architecture and execution.
13
+
All payloads are different and are created for different purposes, however HatSploit has a strict payload system to distinguish them. There are two types of payload:
14
+
15
+
**Stager* - Payload that is sent first and the main purpose of which is to read the next (bigger) payload into memory and execute it.
16
+
**Staged* - Payload that can be sent by itself or after the stager. This payload is flexible and can contain multiple ways it can be executed, while *stager* has only one.
13
17
14
18
## Using payloads
15
19
16
20
To use a specific payload, you should first select the module that supports payload execution.
17
21
18
22
Let's take `exploit/linux/skybridge/100_110_code_execution` module that exploits the built-in backdoor in several routers and attempts to gain code execution.
As you can see, we already have a payload preconfigured for us to use on an exploited system. You can invoke `info` command to find more information about the effects of the module.
52
56
53
-
```hsf
57
+
```entysec
54
58
[hsf3: SkyBridge MB-A100/110 Remote Code Execution]> info
55
59
56
60
Name: SkyBridge MB-A100/110 Remote Code Execution
@@ -83,4 +87,8 @@ Stability:
83
87
84
88
Reliability:
85
89
Module spawns weak (unstable) session
86
-
```
90
+
```
91
+
92
+
## Developing the payload
93
+
94
+
If you want to contribute and develop your own payload, you might find this guide useful - [Writing Payloads](/docs/development/writing-payloads)
Copy file name to clipboardexpand all lines: docs/getting-started/hatsploit-plugins.md
+13-8
Original file line number
Diff line number
Diff line change
@@ -13,16 +13,17 @@ If you are interested in learning how to develop and write your own plugins for
13
13
14
14
To demonstrate how plugins work, let’s try loading one of the fun plugins included with HatSploit – `cowsay`. The framework provides a dedicated `load` command for this purpose, and its usage is quite simple:
15
15
16
-
```hsf
16
+
```entysec
17
17
[hsf]> load
18
18
Usage: load <plugin|number>
19
19
```
20
20
21
-
**Note:** Plugins can be loaded either by their name or by their number, as listed in the output of `search` or `show` commands.
21
+
{: .note }
22
+
An argument for `load` command can be an index as mentioned above. This index can be obtained for the table produced by `search` or any other command that retrieves plugin list.
22
23
23
24
When you load the `cowsay` plugin, the following amusing cow message will appear:
24
25
25
-
```hsf
26
+
```entysec
26
27
[hsf]> load cowsay
27
28
[*] Loading cowsay plugin...
28
29
________________
@@ -40,17 +41,16 @@ When you load the `cowsay` plugin, the following amusing cow message will appear
40
41
41
42
Once the plugin is loaded, it adds a new command to the main HatSploit interface.
42
43
43
-
```hsf
44
+
```entysec
44
45
Cowsay Commands:
45
46
46
47
Command Description
47
-
------- -----------
48
48
cowsay Ask the cow to say a message.
49
49
```
50
50
51
51
Now, executing the newly available `cowsay` command with the argument `HatSploit is Great` will produce the following output:
52
52
53
-
```hsf
53
+
```entysec
54
54
[hsf]> cowsay 'HatSploit is Great'
55
55
____________________
56
56
< HatSploit is Great >
@@ -66,13 +66,18 @@ Now, executing the newly available `cowsay` command with the argument `HatSploit
66
66
67
67
When you no longer need a plugin, you can free up space by unloading it using the `unload` command:
68
68
69
-
```hsf
69
+
```entysec
70
70
[hsf]> unload
71
71
Usage: unload <plugin|number>
72
72
```
73
73
74
-
**Note:** Just like with the `load` command, plugins can be unloaded by their name or their corresponding number from the `search` or `show` lists.
74
+
{: .note }
75
+
An argument for `unload` command can be an index as mentioned above. This index can be obtained for the table produced by `search` or any other command that retrieves plugin list.
75
76
76
77
## Discovering more plugins
77
78
78
79
If you are eager to explore and utilize additional plugins, a more comprehensive collection can be found here - [HatSploit Plugins](/docs/plugins).
80
+
81
+
## Developing the plugin
82
+
83
+
If you want to contribute and develop your own plugin, you might find this guide useful - [Writing Plugins](/docs/development/writing-plugins)
0 commit comments