𝙼𝙴𝙲𝙷 𝚟𝟷.0.𝟻 𝚋𝚢 @𝚝𝚎𝚜𝚝𝚌𝚘𝚖p𝚞𝚝𝚎𝚛
Mech is an intelligent and automated solution meticulously crafted to simplify the complexities of penetration testing. Its purpose is clear: to equip security professionals with an advanced tool that seamlessly integrates into their workflow, enhancing their capabilities and efficiency. At its core, Kaboom is a multi-faceted tool that excels in two fundamental phases of penetration testing: information gathering and vulnerability assessment. This automated powerhouse streamlines the process, allowing testers to focus on analyzing results rather than grappling with manual tasks.
For assistance on installing, check out our Installation Walkthrough.
Mech with both interactive and non-interactive modes:
Just type kaboom
and hit [ENTER], and the script handles the rest
┌──(root㉿test-station)-[/home/user1/kaboom/kaboom]
└─# kaboom
Insert hosts (example 192.168.1.1-5):
>> 10.10.10.222
Insert path where to save results (without final /):
>> /home/user1/Documents
choice the phases to perform [i=IG, v=VA, d=dictionary]:
>> iv
Shutdown pc at the end of script [YES/NO] (default NO):
>> NO
Use the command kaboom -t <target_ip> -f <report_path> [-p one_or_more_phases]
for specific targeting and reporting.
┌──(root㉿test-station)-[/home/user1/kaboom]
└─# kaboom -t 10.10.11.579 -f scan-results.txt /home/user1/Documents
If you need assistance, run kaboom -h
(or kaboom --help
) to access the help menu and explore available options.
┌──(root㉿test-station)-[/home/user1/kaboom/kaboom]
└─# kaboom --help
Usage:
Interactive mode:
kaboom [ENTER] ...and the script does the rest
NON-interactive mode:
kaboom -t <target_ip> -f <report_path> [-p one_or_more_phases]
phases:
- i == information gathering
- v == vulnerability assessment
- d == dictionary attack against open services
example: iv == information gathering + vulnerability assessment
dafault: ALL (ivb)
Revolutionize your penetration testing approach with Kaboom. This powerful tool redefines efficiency and precision in the cybersecurity landscape. Kaboom isn't just a collection of functions – it's a streamlined solution that enhances your capabilities.
Gone are complex interfaces and scattered data. Kaboom-APT simplifies and streamlines your processes, allowing you to focus on analysis and action. It automates tasks, saving you time and guiding you towards impactful insights.
Kaboom's strength lies in its ability to uncover vulnerabilities that were previously hidden. By integrating tools like Sublist3r and Nmap, it empowers you to navigate your digital landscape with clarity and precision.
Embrace Kaboom as your essential companion in the realm of cybersecurity. By doing so, you're amplifying your skills and expertise, ensuring a successful and secure digital journey. Your path to efficiency and proficiency begins with Kaboom-APT – the ultimate tool for modern penetration testing.
_.-^^---....,,--
_-- --_
< >)
| |
\._ _./
```--. . , ; .--'''
| | |
.-=|| | |=-.
`-=#$%&%$#=-'
| ; :|
_____.,-#%&$@%#&#~,._____
┌──(root㉿test-station)-[/home/user1/kaboom/kaboom]
└─# kaboom
Insert hosts (example 192.168.1.1-5):
>> 10.10.10.222
Insert path where to save results (without final /):
>> /home/user1/Documents
choice the phases to perform [i=IG, v=VA, d=dictionary]:
>> iv
Shutdown pc at the end of script [YES/NO] (default NO):
>> NO
[*******************************************************]
[***]START SCRIPT AT Thu Aug 17 06:55:51 PM MDT 2023[***]
[*******************************************************]
----------------------------------
----------------------------------
ITAREATION: 1
TARGET: 10.10.10.222
PROGRESS: [===================>]
----------------------------------
[PHASE:]starting IG...
[+] Network Mapper activated. Connection establishing...
[*] Scanning the network...
Starting Nmap 7.94 ( https://nmap.org ) at 2023-08-17 18:54 MDT
Illegal character(s) in hostname -- replacing with '*'
Illegal character(s) in hostname -- replacing with '*'
Nmap scan report for http:**delivery.htb (10.10.10.222)
Host is up (0.13s latency).
PORT STATE SERVICE
22/tcp open ssh
| ssh-hostkey:
| 2048 9c:40:fa:85:9b:01:ac:ac:0e:bc:0c:19:51:8a:ee:27 (RSA)
| 256 5a:0c:c0:3b:9b:76:55:2e:6e:c4:f4:b9:5d:76:17:09 (ECDSA)
|_ 256 b7:9d:f7:48:9d:a2:f2:76:30:fd:42:d3:35:3a:80:8c (ED25519)
80/tcp open http
|_http-title: Welcome
Nmap done: 1 IP address (1 host up) scanned in 5.06 seconds
[PHASE:]starting VA...
==================================================================
--------•?((¯°·..• Vulnerability Report •._.·°¯))؟• --------------
==================================================================
Critical: 0
High: 1
Medium: 3
Low: 1
Info: 5
Score: 37
===================================================================
[*****************************************************************]
[**********] END SCRIPT AT Thu Aug 17 06:54:39 PM MDT 2023 [******]
[*****************************************************************]
To further tailor Kaboom to your needs, you can provide additional arguments and customize its behavior:
-
Configuration Files: Kaboom supports configuration files for fine-tuning its operation.
-
Wordlists: Customize wordlists for dictionary attacks using Hydra and Dirb, enhancing attack efficiency.
-
Output Customization: Personalize output file names and locations to match your preferences.
Kaboom recognizes that each engagement requires a unique approach. Customize the tool to your specific needs:
- Adjust variables for tailored wordlists and output filenames.
HYDRA_WORDLIST="custom_hydra_wordlist.txt"
DIRB_WORDLIST="custom_dirb_wordlist.txt"
OUTPUT_FILENAME="custom_report.txt"
Kaboom empowers you to customize its behavior by adjusting variables at the script's outset. This allows you to tailor the tool to your specific requirements, whether it's selecting wordlists for Hydra and Dirb, specifying a Metasploit scan script, or refining output file names. Kaboom ushers in a new era of penetration testing, where automation, efficiency, and precision converge to yield unparalleled results. With its advanced features and user-friendly interface, Kaboom is your ally in fortifying digital landscapes against potential threats. Experience the power of Kaboom and elevate your penetration testing game today.
#KABOOM_PATH='' # THE PATH COULD BE SET HERE INSTEAD OF IN BASHRC FILE
if [[ "$KABOOM_PATH" == '' ]]; then
KABOOM_PATH='.'
fi
# USER WORDLISTS
USERLIST_HYDRA_SSH="$KABOOM_PATH/user_wordlist_short.txt"
USERLIST_HYDRA_POP3="$KABOOM_PATH/user_wordlist_short.txt"
USERLIST_HYDRA_IMAP="$KABOOM_PATH/user_wordlist_short.txt"
USERLIST_HYDRA_RDP="$KABOOM_PATH/user_wordlist_short.txt"
USERLIST_HYDRA_SMB="$KABOOM_PATH/user_wordlist_short.txt"
# PASSWORD WORDLISTS
PASSLIST_HYDRA="$KABOOM_PATH/fasttrack.txt"
PASSLIST_HYDRA_SSH="$PASSLIST_HYDRA"
PASSLIST_HYDRA_POP3="$PASSLIST_HYDRA"
PASSLIST_HYDRA_IMAP="$PASSLIST_HYDRA"
PASSLIST_HYDRA_RDP="$PASSLIST_HYDRA"
PASSLIST_HYDRA_SMB="$PASSLIST_HYDRA"
# DIRB WORDLISTS
HTTP_WORDLIST="$KABOOM_PATH/custom_url_wordlist.txt"
HTTP_EXTENSIONS_FILE="$KABOOM_PATH/custom_extensions_common.txt"
# METASPLOIT SCAN SCRIPT
METASPLOIT_SCAN_SCRIPT='./metasploit_scan_script'
# NMAP FILES
SCRIPT_SYN='script-syn'
UDP='udp'
SYN='syn'
```
Here's a brief breakdown of what the script does:
-
Setting Mech Path: The script starts by checking whether the
MECH_PATH
variable is already set. If it's not set, the script assigns the current directory (.
) to theMECH_PATH
variable. -
Defining User Wordlists: The script defines various
USERLIST_HYDRA_*
variables that point to user wordlists for different protocols like SSH, POP3, IMAP, RDP, and SMB. These wordlists likely contain usernames or accounts for dictionary attacks. -
Defining Password Wordlists: Similar to user wordlists, the script defines
PASSLIST_HYDRA_*
variables for different protocols, pointing to password wordlists. These wordlists are used for dictionary attacks to try different passwords for each account. -
Defining Dirb Wordlists: The script sets the
HTTP_WORDLIST
variable for custom URL wordlists andHTTP_EXTENSIONS_FILE
for common file extensions. These are likely used in the Dirb tool to perform web resource enumeration. -
Setting Metasploit Scan Script: The
METASPLOIT_SCAN_SCRIPT
variable is set to the path of a Metasploit scan script. This script might be used by Kaboom to automate Metasploit scans. -
Defining Nmap Files: The
SCRIPT_SYN
,UDP
, andSYN
variables are set to specific Nmap file names. These could be used to customize the Nmap scan behavior within Kaboom.
In summary, this script aims to enhance the customization and flexibility of Kaboom by allowing users to specify different paths, wordlists, and scripts to be used during penetration testing. This level of customization helps security professionals adapt the tool to their specific testing scenarios and requirements.
Efficiency matters in penetration testing. Kaboom answers this need with multi-target specification:
kaboom -t <target_ip> -f <report_path> -p one_or_more_phases
Elevating Interaction: The New CLI Interface
Interacting with Kaboom is more intuitive than ever:
kaboom -t <target_ip> -f <report_path> -p one_or_more_phases
Precision in Discovery: Enhanced Nmap Scans
Kaboom's Nmap scan functionality has transformed:
kaboom -t <target_ip> -f <report_path> -p nmap
Structured Clarity: Streamlined Directory Hierarchy
Managing data across multiple targets made easy:
# Directory hierarchy
/home/user1/Documents/kaboom/target1
/home/user1/Documents/kaboom/target2
Automating Insights: Automatic Metasploit Research
Simplify association of Metasploit modules with CVE codes:
kaboom -t <target_ip> -f <report_path> -p metasploit
Widening the Scope: Non-Canonical Port Recognition
Modern networks harbor services on non-canonical ports:
__,-~~/~ `---.
_/_,---( , )
__ / < / ) \___
- ------===;;;'====------------------===;;;===----- - -----
\/ ~"~"~"~"~"~\~"~)~"/
(_ ( \ ( > \)
\_( _ < >_>'
~ `-i' ::>|--"
I;|.|.|
<|i::|i|`.
(` ^'"`-' ")
_____.,-#%&$@%#&#~,._____
kaboom -t <target_ip> -f <report_path> -p non_canonical_ports
As Kaboom evolved, a parallel project named Trigmap (Trigger Nmap) emerged. Trigmap shares similar objectives with Kaboom but adopts a distinct approach. This sibling tool relies exclusively on Nmap to execute its tasks. The synergy between Kaboom and Trigmap enriches penetration testing endeavors, offering a comprehensive toolkit for varying scenarios. In a world where network security remains paramount, Trigmap emerges as a powerful ally, facilitating network audits, vulnerability assessments, and reconnaissance with efficiency and clarity. Leveraging the strength of Nmap's scripting engine (NSE), Trigmap orchestrates a symphony of tasks to achieve a holistic view of the target network. Its capacity to leverage Nmap's NSE capabilities and translate them into an accessible format makes Trigmap an indispensable asset for security practitioners seeking an advanced yet approachable solution for network analysis.
To delve deeper into Trigmap's capabilities, visit the Trigma repository
Kaboom-APT is a tool of empowerment, carefully crafted for cybersecurity professionals striving to enhance their capabilities. While the potential it holds is awe-inspiring, it comes hand in hand with a profound responsibility. As you embark on your journey with Kaboom-APT, we emphasize the need for ethical conduct, responsible use, and a steadfast commitment to upholding the principles of cybersecurity.Kaboom is a tool designed to empower cybersecurity professionals, but its power comes with an inherent responsibility. We stress the importance of ethical conduct and responsible use. The authors and contributors behind Kaboom underline several crucial principles:Responsible Usage: Kaboom is intended solely for legitimate and ethical penetration testing. It should never be employed for malicious or unlawful activities, aligning with the highest standards of professional conduct. Authorized Testing: Prior authorization is essential before using Kaboom for penetration testing. Unauthorized use can lead to unintended consequences and legal actions.Informed Consent: Always ensure that you have obtained informed consent from system or network owners before conducting tests. Transparent communication is key.Respect for Privacy: Uphold privacy and confidentiality during testing, refraining from accessing or sharing sensitive information without proper authorization. Limited Scope: Use Kaboom with discretion to avoid disruptions or harm to systems. Excessive scanning should be avoided.