logo
 
  1. IT-Security >
  2. Hacking >
  3. EHTools Framework: A Framework Of Serious Penetration Tools And Wi-Fi Pentesting


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

EHTools Framework: A Framework Of Serious Penetration Tools And Wi-Fi Pentesting

Hacking vom | Direktlink: githacktools.blogspot.com Nachrichten Bewertung


About EHTools Framework
   Wi-Fi tools keep getting more and more accessible to beginners, and the EHTools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.

Why choice EHTools Framework?

   Lots of pentesting tools installed by default: More than 58 options installed by default you can find in EHTools Framework such as Metasploit FrameworkWireShark and other tools!

   Password protection and config encryption: In version 2.1.6 the authors added pasword protection for users who think that his/her friend or parents will turn into EHTools Framework and will remove or destroy it. Only for this people the authors create password protection for EHTools Framework 🙂


   Easy in learning and this is the best framework for beginners: EHTools Framework's TUI is very simple for beginners, you can start attack on the local network by choosing an option from main menu. It is very simple, is not it?


   UX/UI impruvements for beginners: It uses the names you supply to connect to the tools needed to execute any attacks you select! Aside from that initial input, the majority of the possible attacks can be performed merely by choosing the option number from the menu. This means you can grab a network handshake or download a new hacking tool like Pupy by just selecting from one of the menu options!


   More than 100 tools you can install from EHTools Framework or Lite: Our framework has more than 100 packages in EHTools Framework archive (on server this archive: 2.3 TB)!


System requirements for EHTools Framework

   Full root access and access to /root folder: All EHTools Framework files and folders will copy to /root/bin and /etc system folders, for copy ehtools data to your system needed root access!

   Bourne-again shell and Gnome-terminal shell needed for EHTools Framework GUI and also without Gnome-terminall shell modules such as (eht1, eht2 and etc.) will not work!


   Good internet connection for server support (only EHTools Framework Pro): The server support for ehtools PRO is one of system requirements, it is needed for collect information about EHTools Framework crashes and it is also needed for check product status such as (you bought ehtools/you did not buy ehtools)


EHTools Framework Installation

   To uninstall EHTools Framework, enter this command: ehtools -r

How to activate EHTools Framework Pro
   This key you can buy on the EHTools website for one dollar! This key is used to activate EHTools Framework PRO enter it in the input field of the activation key in the file install.sh and then you can install EHTools Framework and use it only for educational purposes!

   WARNING: The key works only one week then it changes!

You need to have time to enter it before it is updated!

Enter your ehtools activation key!
You can buy it on the ehtools site!
(activation_key)>

   Also, the the authors do not recommend to change the source code of ehtools because it is very complex and you can mess up something and disrupt the framework!


Selecting version of EHTools Framework

   After executing install.sh it will be ask you to select version of EHTools Framework: Pro or Lite.
   Select Lite if you did not buy EHTools Framework Pro. If you bought Ehtools Framework pro license key from EHTools website, select Pro.

What version of Ehtools Framework do you want to install?(pro/lite):
If you did not buy Ehtools Framework PRO, select LITE!
If you bought Ehtools Framework PRO, select PRO
(version)>


   If you select EHTools Framework Pro, you will need to activate it with your EHTools Framework Activation Key that you need to bought on the EHTools website. If you have EHTools Framework Activation Key, read the following instructions.


Attacking Frameworks

   Most new Wi-Fi hacking tools rely on many of the same underlying attacks, and scripts that automate using other more familiar tools like Aireplay-ng are often referred to as frameworks. These frameworks try to organize tools in smart or useful ways to take them a step beyond the functionality or usability of the original program.

   An excellent example of this are programs that integrate scanning tools like Airodump-ng, attacks like WPS Pixie-Dust, and cracking tools like Aircrack-ng to create an easy-to-follow attack chain for beginners. Doing this makes the process of using these tools easier to remember and can be seen as sort of a guided tour. While each of these attacks is possible without the hand-holding, the result can be faster or more convenient than trying to do so yourself.


   An example of this the authors have covered is the Airgeddon, a wireless attack framework that does useful things like automating the target selection process and eliminating the time a user spends copying and pasting information between programs. This saves valuable time for even experienced pentesters but has the disadvantage of preventing beginners from understanding what's happening "under the hood" of the attack. While this is true, most of these frameworks are fast, efficient, and dead simple to use, enabling even beginners to take on and disable an entire network.


UX/UI impruvements for beginners

   The EHTools Framework starts by merely typing the letter ehtools or eht into a terminal window, then it asks for the name of your network interfaces after the first run. It uses the names you supply to connect to the tools needed to execute any attacks you select. Aside from that initial input, the majority of the possible attacks can be performed merely by choosing the option number from the menu. This means you can grab a network handshake or download a new hacking tool like Pupy by just selecting from one of the menu options.

Use basic networking tools

   To begin, the we can access data about the network they're currently connected to, as well as any network interfaces, from the main menu. Here, we can find local information by just typing l to pull up local IP information, as seen below.

   This allows us to do things like scan the network for other devices. This part of EHTools Framework gives us better visibility on a network and situational awareness of what devices are around us. The various information can be broken down as follows:
  • if: To run ifconfig and gives the names and information about all network devices
  • 1: Enables wlan0
  • d1: Disables wlan0
  • 2: Enables wlan0mon
  • d2: Disables wlan0mon
  • 3: Randomize or set the MAC address to a specific value
  • 7: View the public IP address your computer is leaving on sites you visit
  • 19: Look up the physical address of a given IP address to determine it's relative location
  • scan: Start an ARP scan on the network to discover nearby devices
  • start: Start monitor mode on the wireless network adapter
  • stop: Stop wireless monitor mode on the network adapter
Use EHTools Framework quick access
   Run it to open quick access menu: ehtools -o
   Run it to update EHTools Framework: ehtools -u
   Run it to remove EHTools Framework: ehtools -r
   Run it to make handshake: ehtools -h
   Run it to open WPS menu: ehtools -w

Install new tools on EHTools Framework
   Part of the fun of Ehtools Framework is how easy it is to add new tools to our arsenal. To demonstrate this, let's download Pupy, a Python-based RAT designed to take control of other computers on the network. We can select option 9 to access the list of tools in EHTools Framework.

   From the next menu, the tools are broken down into major categories, with options for managing the installation of scripts. The options presented are:

  • 1: Wi-Fi tools (tools for attacking wireless networks and network databases)
  • 2: Remote access (tools for getting remote access to other devices and remotely managing them)
  • 3: Information gathering (collecting intelligence on people or website)
  • 4: Website tools (tools for exploiting or attacking sites)
  • 5: Other (a miscellaneous collection of other hacking tools)
   You can also manage your installed tools by accessing option 6. To download Pupy, we'll go to option 2, which is remote access. Here, we will see a list of different tools for remote access, and we can select option 3 for Pupy.

About EHTools Framework server support
   Server support for ehtools Pro is very important, as all error reports are sent to it in order to improve and fix vulnerabilities and bugs!

   COUNCIL: Make a good internet connection for EHTools Framework, to help EHTools Framework access to server!

   If in consequence of bad Internet connection EHTools Framework will not be able to communicate with the server then the framework will not start because of access denial and due to a validation error for check ehtools bought or not bought!

   If there is the bad internet connection, EHTools Framework will say you this:
[*] There is no connection!

   If you did not buy EHTools Framework, EHTools Framework will say you this:
[*] Failed to open session for ehtools!

How to protect EHTools Framework with password

   Do it with install.sh: Create login and password from install.sh.
   Defaults is login: ehtools, password: sloothe.

   Do it when you are going to exit from EHTools Framework, exit with shortcuts:
0 or exit.

   Do not do it when you are going to exit from EHTools Framework. WARNING: Do not just close EHTools Framework window!

Terms of use
   This tool is only for educational purposes only.
   Use this tool wisely and never without permission.
   The authors are not responsible for anything you do with this tool.


...

Externe Webseite mit kompletten Inhalt öffnen

Kommentiere zu EHTools Framework: A Framework Of Serious Penetration Tools And Wi-Fi Pentesting






➤ Ähnliche Beiträge

  • 1.

    EHTools Framework: A Framework Of Serious Penetration Tools And Wi-Fi Pentesting

    vom 2772.12 Punkte ic_school_black_18dp
    About EHTools Framework   Wi-Fi tools keep getting more and more accessible to beginners, and the EHTools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used f
  • 2.

    Ehtools - Framework Of Serious Wi-Fi Penetration Tools

    vom 1278.65 Punkte ic_school_black_18dp
    Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new
  • 3.

    Semmle: All Burp Suite Scan report

    vom 697.59 Punkte ic_school_black_18dp
    Summary: [1. Detected Deserialization RCE: Jackson 1.1. https://lgtm-com.pentesting.semmle.net/blog/ [lgtm_short_session cookie] 1.2. https://lgtm-com.pentesting.semmle.net/internal_api/v0.2/getSuggestedProjects [apiVersion parameter] 2. Session token in URL 3. CSP: Inline scripts can be inserted 3.1. https://
  • 4.

    Lockdoor Framework - A Penetration Testing Framework With Cyber Security Resources

    vom 546.33 Punkte ic_school_black_18dp
    Lockdoor Framework : A Penetration Testing Framework With Cyber Security Resources.09/2019 : 1.0Beta Information Gathring Tools (21) Web Hacking Tools(15) Reverse Engineering Tools (15) Exploitation Tools (6) Pentesting & Security Assessment Findings Report Temp
  • 5.

    Lockdoor-Framework: A PenTesting Framework With Cyber Security Resources

    vom 272.59 Punkte ic_school_black_18dp
    About Lockdoor-Framework    Author: SofianeHamlaoui Github: SofianeHamlaoui Twitter: S0fianeHamlaoui Facebook: S0fianeHamlaoui    Tested on: Kali Linux, Ubuntu, Arch Linux, Fedora, OpenSuse and Windows (Cygwin)   LockDoor is a Framework
  • 6.

    .NET Framework May 2019 Security and Quality Rollup

    vom 173.81 Punkte ic_school_black_18dp
    Today, we are releasing the May 2019 Cumulative Update, Security and Quality Rollup, and Security Only Update. Security CVE-2019-0820 – Denial of Service Vulnerability A denial of service vulnerability exists when .NET Framework and .NET Core improperly process RegEx strings. An attacker who successfully explo
  • 7.

    .NET Framework September 2019 Security and Quality Rollup

    vom 166.48 Punkte ic_school_black_18dp
    Today, we are releasing the September 2019 Cumulative Update, Security and Quality Rollup, and Security Only Update for .NET Framework. Security CVE-2019-1142– .NET Framework Elevation of Privilege Vulnerability An elevation of privilege vulnerability exists when the .NET Framework common language runtime (CLR) allows file creation in ar
  • 8.

    .NET Framework July 2019 Security and Quality Rollup

    vom 161.04 Punkte ic_school_black_18dp
    Today, we are releasing the July 2019 Cumulative Update, Security and Quality Rollup, and Security Only Update for .NET Framework. Security CVE-2019-1006 – WCF/WIF SAML Token Authentication Bypass Vulnerability An authentication bypass vulnerability exists in Windows Communication Foundation (WCF) and Windows Identity Foundation
  • 9.

    AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide

    vom 143.99 Punkte ic_school_black_18dp
    Original release date: October 11, 2018Summary This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States.[1][2][3][4][5] In it we highlight the use of five publicly
  • 10.

    Announcing .NET Core 3 Preview 1 and Open Sourcing Windows Desktop Frameworks

    vom 137.83 Punkte ic_school_black_18dp
    Today, we are announcing .NET Core 3 Preview 1. It is the first public release of .NET Core 3. We have some exciting new features to share and would love your feedback. You can develop .NET Core 3 applications with Visual Studio 2019 Preview 1, Visual St
  • 11.

    .NET Framework 4.8 is available on Windows Update, WSUS and MU Catalog

    vom 134.09 Punkte ic_school_black_18dp
    We are happy to announce that Microsoft .NET Framework 4.8 is now available on Windows Update, Windows Server Update Services (WSUS) and Microsoft Update (MU) Catalog. This release includes quality and reliability fixes based on feedback since the .NET Framewor
  • 12.

    .NET Framework October 2019 Security and Quality Rollup

    vom 131.73 Punkte ic_school_black_18dp
    Today, we are releasing the October 2019 Security and Quality Rollup and Cumulative Updates for .NET Framework. Security No new security fixes. See September 2019 Security and Quality Rollup for the latest security updates. Quality and Reliability This release contains the followin