Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ Project-Black - Pentest/BugBounty Progress Control With Scanning Modules

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Project-Black - Pentest/BugBounty Progress Control With Scanning Modules


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: feedproxy.google.com


Scope control, scope scanner and progress tracker for easier working on a bug bounty or pentest project.

What is this tool for?
The tools encourages more methodical work on pentest/bugbounty, tracking the progress and general scans information.
It can launch
  • masscan
  • nmap
  • dirsearch
  • amass
  • patator
against the scope you work on and store the data in a handy form. Perform useful filtering of the project's data, for instance:
  • find me all hosts, which have open ports, but not 80
  • find me all hosts, whose ips start with 82.
  • find me hosts where dirsearch has found at least 1 file with 200 status code

Installation
Basic setup via docker-compose will run on any system which has docker and docker-compose dependency
If you don't have docker installed then

Docker for Ubuntu/Debian
sudo apt install docker.io

Tool installation
If you have docker set up, then for Ubuntu/Debian simply
sudo curl -L "https://github.com/docker/compose/releases/download/1.23.1/docker-compose-$(uname -s)-$(uname -m)" -o /usr/local/bin/docker-compose
sudo chmod +x /usr/local/bin/docker-compose
git clone https://github.com/c0rvax/project-black
cd project-black
sudo docker-compose up
If you see some SQL errors, try stopping docker-compose (Ctrl + C once and wait for nice shutdown) and run docker-compose up
This might take some time but that's it! Other distros should have very similar guidance.
Now head to http://localhost:5000, enter the credentials. They can be found in https://github.com/c0rvax/project-black/blob/master/config/config_docker.yml under application
For a more complex setup or something failed, see the wiki.

Resources notice
None of the docker containers restrict the amount of resources usage, you are on your own here, however, you can change the amount of parallel tasks for each worker separately. See the wiki for that

How to work?
After a setup, create a project and head to the respective page.


Now we will follow the basic steps which you can do within the application

Add scope
Let's say we are assessing hackerone.com and all it's subdomains. Write hackerone.com into the add scope field and press Add to scope


Entrypoint has been added.
There are other ways to add scope, see wiki

Quick note on working
All of the tasks can read parameters from the user, however, lauching with some options won't diplay any new result as it is pretty difficult to parse all possible outputs of a program. So to start, try working duplicating the options from this manual.
Available options can be found on this page

Start amass
Click the blue button Launch task.


A popup with parameters will appear.


It is recommended to click the All_top_level_domains check box and in argv enter -ip and click Fire! button.


This would launch amass -d hackerone.com -ip. Note that in this case we did not specify any domain. This is beacause the All_top_level_domains check box means looking into the scope which is stored in the database. So the program sees that hackerone.com was added to the scope and launches amass against it.
Upon finishing, the new data is automatically added to scope.

Start masscan and nmap
Now head to IPs tab. Click the already known button Launch task and choose masscan.
We will launch a quick scan, using the button Top N ports. This autocompletes the argv parameter. Press Fire!


Results are automatically downloaded from the database.


Now click Launch task and choose nmap only open. This will find all the open ports which exist in the database and run nmap only against them.
Click Banner and Fire.


Detected banner will automatically appear


Launching dirsearch
Launch dirsearch against all ips and all open ports (both HTTP and HTTPS would be tried)
On IPs tab click Launch task and select dirsearch. Fill in extenstions you want to try and click Fire!
You can launch dirseach agains hosts (not ips) on the Hosts tab.

Note on dirsearch
If there are no ports, dirsearch won't even start. So first, make sure you launched nmap or masscan to discover open ports.

Inspecting results
There are generally three ways to check the results:
  • IPs/Hosts list
  • IP/Host details
  • Dirsearch list

IPs and Hosts list
Those are two tabs. They work the same way so we will stop on Hosts.


You can see a list of hosts, their ports and files. Also you can edit a comment for that host.
Important part here is filtering box.


You can aggregate different filters using the field shown above. Type the filter you want (there is a helper for that) and press Shift + Enter


IP/Host details
You can also view details on a specific host or ip. Press button with the glasses


There you will see dirsearch result for every open port on that host

Dirsearch list
Dirsearch list button will open a new window showing all found files for every dirsearch which was launched in this project.

Launching tasks against specific scope
IPs and Hosts Launch task are different! The button on IPs page will start against all ips within the current project, meanwhile the button on the Hosts page will launch against hosts.
To launch a task against some hosts, you should
  1. Filter the hosts
  2. Launch the task
Example:


Some filters have been applied. If we now launch dirsearch, it will be launched against hosts which correspond to the used filters.


...



๐Ÿ“Œ Practical C++20 Modules and the future of tooling around C++ Modules with Cameron DaCamara


๐Ÿ“ˆ 25.1 Punkte

๐Ÿ“Œ GitHub - ZehMatt/zasm-modules: Generating binary modules with zasm


๐Ÿ“ˆ 25.1 Punkte

๐Ÿ“Œ Progress-Burp - Burp Suite Extension To Track Vulnerability Assessment Progress


๐Ÿ“ˆ 24.94 Punkte

๐Ÿ“Œ Progress in My P2P Library: A Work in Progress


๐Ÿ“ˆ 24.94 Punkte

๐Ÿ“Œ Differences Between Web Application Scanning Tools when Scanning for XSS and SQLi - AppSecUSA 2017


๐Ÿ“ˆ 23.63 Punkte

๐Ÿ“Œ Dynamic Security Scanning in a CI: ZAP Scanning with Jenkins


๐Ÿ“ˆ 23.63 Punkte

๐Ÿ“Œ Vulnerability Scanning with OpenVAS 9 part 3: Scanning the Network


๐Ÿ“ˆ 23.63 Punkte

๐Ÿ“Œ Vulnerability Scanning with OpenVAS 9 part 2: Vulnerability Scanning


๐Ÿ“ˆ 23.63 Punkte

๐Ÿ“Œ PHP Project Management /modules/snf/index.php full_path privilege escalation


๐Ÿ“ˆ 18.53 Punkte

๐Ÿ“Œ PHP Project Management /modules/fax/index.php full_path privilege escalation


๐Ÿ“ˆ 18.53 Punkte

๐Ÿ“Œ PHP Project Management /modules/files/list.php full_path privilege escalation


๐Ÿ“ˆ 18.53 Punkte

๐Ÿ“Œ PHP Project Management /modules/files/list.php def_lang directory traversal


๐Ÿ“ˆ 18.53 Punkte

๐Ÿ“Œ Coreboot project's GSoC "Alex James" is "working on developing modules for Ghidra to assist with firmware reverse engineering"


๐Ÿ“ˆ 18.53 Punkte

๐Ÿ“Œ timetrace v0.10.0 supports project modules, reverting changes and custom status formatting


๐Ÿ“ˆ 18.53 Punkte

๐Ÿ“Œ (Part 2) Golang Framework Hands-on - KisFlow Streaming Computing Framework - Project Construction / Basic Modules


๐Ÿ“ˆ 18.53 Punkte

๐Ÿ“Œ (Part 3)Golang Framework Hands-on - KisFlow Stream Computing Framework - Project Construction / Basic Modules


๐Ÿ“ˆ 18.53 Punkte

๐Ÿ“Œ Error on Node JS npm/npx project creating with vite/react js "node:internal/modules/cjs/loader:1205 throw err"


๐Ÿ“ˆ 18.53 Punkte

๐Ÿ“Œ A new Maui Project Progress report is out. Link in the comments


๐Ÿ“ˆ 18.45 Punkte

๐Ÿ“Œ Spider-Man (Neversoft) decompilation project Progress Checkpoint - May 2024


๐Ÿ“ˆ 18.45 Punkte

๐Ÿ“Œ EFF Launches New AI Progress Measurement Project


๐Ÿ“ˆ 18.45 Punkte

๐Ÿ“Œ Kernel 5.12 released with Nintendo 64 support. There's already some project in development using it? I would love to follow the progress.


๐Ÿ“ˆ 18.45 Punkte

๐Ÿ“Œ The Dream of a Windows 11 Phone Lives On as Unofficial Project Makes Progress


๐Ÿ“ˆ 18.45 Punkte

๐Ÿ“Œ OpenSSF shares progress for its Alpha-Omega project in 2023


๐Ÿ“ˆ 18.45 Punkte

๐Ÿ“Œ Progress - Open Source Project(w. Codu)


๐Ÿ“ˆ 18.45 Punkte

๐Ÿ“Œ Ruby 1.9 up to 2.0.0 Fiddle / DL modules $SAFE access control


๐Ÿ“ˆ 18.03 Punkte

๐Ÿ“Œ CVE-2014-9773 | atheme up to 7.2.6 Anope Flag modules/chanserv/flags.c access control (Nessus ID 91207 / ID 168851)


๐Ÿ“ˆ 18.03 Punkte

๐Ÿ“Œ FreeBSD 8.3/9.0/9.1/9.2 sys_netinet6/sys_netatm Modules access control


๐Ÿ“ˆ 18.03 Punkte

๐Ÿ“Œ Progress Sitefinity 10.0 / 10.1 Broken Access Control / LINQ Injection


๐Ÿ“ˆ 17.95 Punkte

๐Ÿ“Œ Progress Sitefinity 10.0 / 10.1 Broken Access Control / LINQ Injection


๐Ÿ“ˆ 17.95 Punkte

๐Ÿ“Œ #0daytoday #Progress Sitefinity 10.0 / 10.1 Broken Access Control / LINQ Injection Vulnerability [#0day #Exploit]


๐Ÿ“ˆ 17.95 Punkte

๐Ÿ“Œ Scanner-Cli - A Project Security/Vulnerability/Risk Scanning Tool


๐Ÿ“ˆ 17.8 Punkte

๐Ÿ“Œ AutoPWN Suite - Project For Scanning Vulnerabilities And Exploiting Systems Automatically


๐Ÿ“ˆ 17.8 Punkte

๐Ÿ“Œ On the Google Book Scanning Project and the Library We Will Never See


๐Ÿ“ˆ 17.8 Punkte

๐Ÿ“Œ Recently had to create a new FB account for this project and it insisted on scanning my face as a REQUIREMENT.


๐Ÿ“ˆ 17.8 Punkte

๐Ÿ“Œ A Look at Earth Archive, a Project To Produce Detailed Maps of All the Land on Earth Through Laser Scanning


๐Ÿ“ˆ 17.8 Punkte











matomo