Inguma-Cli

Description

Inguma-Cli is a penetration testing toolkit entirely written in python. The framework includes modules to discover hosts, gather information about, fuzz targets, brute force user names and passwords and, of course, exploits.

While the current exploitation capabilities in Inguma may be limited, this program provides numerous tools for information gathering and target auditing.

Usage

Syntax

inguma  <flag>

Options

-d      Show debug information
-h      Show this help and exit

Example

cyborg@cyborg:~$ sudo inguma 
Inguma v0.4
Copyright (c) 2006-2008 Joxean Koret <joxeankoret@yahoo.es>
Copyright (c) 2009-2011 Hugo Teso <hugo.teso@gmail.com>

No module named cx_Oracle

Type 'help' for a short usage guide.
inguma> help

+----------------------------------------------------------------------------+
| load kb                 | Load the knowledge base                          |
| save kb                 | Save the knowledge base                          |
| clear kb                | Clear the knowledge base's data                  |
| show kb                 | Shows the knowledge base's data (very verbose)   |
| report                  | Generate a report                                |
|----------------------------------------------------------------------------|
| show discover           | Show discover modules                            |
| show gather             | Show gather modules                              |
| show rce                | Show RCE modules                                 |
| show fuzzers            | Show fuzzing modules                             |
| show exploits           | Show available exploits                          |
| show brute              | Show brute force modules                         |
| show options            | Show options                                     |
| payload                 | Show the supported OS types and payloads         |
| info <exploit>          | Show additional information about an exploit     |
|----------------------------------------------------------------------------|
| autoscan                | Perform an automatic scan                        |
| autoexploit             | Exploit wizard                                   |
| exploit                 | Run an exploit against a target or targets       |
|----------------------------------------------------------------------------|
| use <mod>               | Load all modules from a directory                |
| ! <command>             | Run an operating system command                  |
| exit | quit | ..        | Exit Inguma                                      |
| help | h | ?            | Show this help                                   |
|----------------------------------------------------------------------------|
|                                                                            |
| To see registered scapy commands execute command 'scapy.lsc()'             |
|----------------------------------------------------------------------------|
|                                                                            |
| NOTE: Remember to use 'scapy.<function>' to use.                           |
|                                                                            |
| Type 'scapy.interact()' to start an scapy session.                         |
| To get help for scapy commands type help(scapy.<scapy command>).           |
+----------------------------------------------------------------------------+

Any other typed text will be evaluated - with eval() - as a Python expression.

inguma> exploit
Target: 192.168.1.7
Select module [all]:
Running sunproxybof ...
[+] Launching attack against 192.168.1.7:8080
[+] Exploit works!
Running oraoiddos ...
[+] Connecting to ldap://192.168.1.7:389...
0 Comments

Leave a reply

CONTACT US

We're are building as a community and a team. Be a part of it.

Sending

©2017 Ztrela Knowledge Solutions Pvt. Ltd

Log in with your credentials

Forgot your details?