An automation tool for system administrators, security engineers, pen testers and related roles. This tool is similar to Ansible in spirit but takes a shell scripting first approach.
This script (fleet.sh
) logs into specific IPs defined in a text file (hosts.txt
) and executes a user defined task (for example, ./tasks/info/os_name_version.sh
). Note that the same credentials are used to log into multiple hosts.
- Source and destination hosts are Linux.
- Bash, nmap, ssh and sshpass are installed.
- Git clone this repo:
git clone https://github.com/ayushmanchhabra/fleet
- Hop into the folder:
cd ./fleet
- Set your password:
export SSHPASS=secret_password
- Execute the script:
bash ./fleet.sh host_username ./hosts.csv ./tasks/info/os_name_version.sh
- Unset your password:
unset SSHPASS
- Pentester: Check if credentials are valid before doing OS scanning.
- Security engineer: Check how many IPs are using a vulnerable version of a specific package or packages.
- System administrator: Filter out ICMP timestamp requests and responses on many IPs using
iptables
.
- Only supports password based authentication.
MIT.
Legal disclaimer: Usage of fleet on hosts without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.