Lockdoor Framework – A Penetration Testing framework

lockdoor

Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources


Changelog

Version v2.3 IS OUT !!

    - Fixing some CI 
    - making a more stable version 
    - new docker iaage build
    - adding packages for each supported distros

Versions

06/2021 : 2.3

  • Config file checking.
  • Updating the tools.
  • Showing the current version of Lockdoor by -v arg.
  • checking the version and asking for possible update.
  • Making it easier to customize.
  • No added tools for the moment.
  • Fixing the docker misconfiguration, the docker version now works perfectly.
    • Information Gathring Tools (21)
    • Web Hacking Tools(15)
    • Reverse Engineering Tools (15)
    • Exploitation Tools (6)
    • Pentesting & Security Assessment Findings Report Templates (6)
    • Password Attack Tools (4)
    • Shell Tools + Blackarch’s Webshells Collection (4)
    • Walk Throughs & Pentest Processing Helpers (3)
    • Encryption/Decryption Tools (2)
    • Social Engineering tools (1)
    • All you need as Privilege Escalation scripts and exploits

03/2020 : 2.2.3

  • Information Gathring Tools (21)
  • Web Hacking Tools(15)
  • Reverse Engineering Tools (15)
  • Exploitation Tools (6)
  • Pentesting & Security Assessment Findings Report Templates (6)
  • Password Attack Tools (4)
  • Shell Tools + Blackarch’s Webshells Collection (4)
  • Walk Throughs & Pentest Processing Helpers (3)
  • Encryption/Decryption Tools (2)
  • Social Engineering tools (1)
  • All you need as Privilege Escalation scripts and exploits
  • Working on Kali,Ubuntu,Arch,Fedora,Opensuse and Windows (Cygwin)

Video Demo

Overview:

LockDoor is a Framework aimed at helping penetration testers, bug bounty hunters And cyber security engineers. This tool is designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for Penetration Testing. But containing the favorite and the most used tools by Pentesters. As pentesters, most of us has his personal ‘ /pentest/ ‘ directory so this Framework is helping you to build a perfect one. With all of that ! It automates the Pentesting process to help you do the job more quickly and easily.

Features

Pentesting Tools Selection 

  • ToolsLockdoor doesn’t contain all pentesting tools , let’s be honest ! Who ever used all the Tools you find on all those Penetration Testing distributions ? Lockdoor contains only the favorite and the most used tools by Pentesters.
  • what Tools: the tools contains Lockdoor are a collection from the best tools on Kali,Parrot Os and BlackArch. Also some private tools from some other hacking teams like InurlBr, iran-cyber. Without forgetting some cool and amazing tools I found on Github made by some perfect human beings.
  • Easy customization: Easily add/remove tools.
  • Installation: You can install the tool automatically using the installer.sh , Manually or by running the Docker Image.

Resources and cheatsheets

  • Resources: That’s what makes Lockdoor, Lockdoor Doesn’t contain only tools ! Pentesing and Security Assessment Findings Reports templates, Pentesting walkthrough examples and templates and more.
  • Cheatsheets: Everyone can forget something on processing or a tool use, or even some tricks. Here comes the Cheatsheets role ! there are cheatsheets about everything, every tool on the framework and any enumeration,exploitation and post-exploitation techniques.

Demo

Installation 

The recommended way to use Lockdoor is by pulling the Docker Image so you will not have to worry about dependencies issues.

A Docker image is available on Docker Hub and automatically re-built at each update:A Docker image is available on Docker Hub and automatically re-built at each update:

https://hub.docker.com/r/sofianehamlaoui/lockdoor

It is initially based on the official debian docker image (debian).

  • Docker Installation
    • Installing requirments sudo apt install docker < Debian-based distributions sudo dnf install docker < RPM-based distributions sudo pacman -S docker < Arch-based distributions sudo zypper install docker < OS-based distributions sudo yum install docker < RH-based distributions
    • Running the container 1. *Pull lockdoor Docker Image:* sudo docker pull sofianehamlaoui/lockdoor 2. *Run fresh Docker container:* sudo docker run -it –name lockdoor-container -w /Lockdoor-Framework –net=host sofianehamlaoui/lockdoor 3. *Run Lockdoor Framework* sudo lockdoor 4. *To re-run a stopped container:* sudo docker start -i sofianehamlaoui/lockdoor 5. *To open multiple shells inside the container:* sudo docker exec -it lockdoor-container bash
  • Using LockAller – Lockdoor Installer

Installing it using the script may take some time depends on the packages already installed on your system. > here you can find a fresh installation on a new debian distro with no pre-installed packages : [11min]

setup

Lockdoor Tools contents

Information Gathering

  • Tools:
    • dirsearch : A Web path scanner
    • brut3k1t : security-oriented bruteforce framework
    • gobuster : DNS and VHost busting tool written in Go
    • Enyx : an SNMP IPv6 Enumeration Tool
    • Goohak : Launchs Google Hacking Queries Against A Target Domain
    • Nasnum : The NAS Enumerator
    • Sublist3r : Fast subdomains enumeration tool for penetration testers
    • wafw00f : identify and fingerprint Web Application Firewall
    • Photon : ncredibly fast crawler designed for OSINT.
    • Raccoon : offensive security tool for reconnaissance and vulnerability scanning
    • DnsRecon : DNS Enumeration Script
    • Nmap : The famous security Scanner, Port Scanner, & Network Exploration Tool
    • sherlock : Find usernames across social networks
    • snmpwn : An SNMPv3 User Enumerator and Attack tool
    • Striker : an offensive information and vulnerability scanner.
    • theHarvester : E-mails, subdomains and names Harvester
    • URLextractor : Information gathering & website reconnaissance
    • denumerator.py : Enumerates list of subdomains
    • other : other Information gathering,recon and Enumeration scripts I collected somewhere.
  • Frameworks:
    • ReconDog : Reconnaissance Swiss Army Knife
    • RED_HAWK : All in one tool for Information Gathering, Vulnerability Scanning and Crawling
    • Dracnmap : Info Gathering Framework

Web Hacking

  • Tools:
    • Spaghetti : Spaghetti – Web Application Security Scanner
    • CMSmap : CMS scanner
    • BruteXSS : BruteXSS is a tool to find XSS vulnerabilities in web application
    • J-dorker : Website List grabber from Bing
    • droopescan : scanner , identify , CMSs , Drupal , Silverstripe.
    • Optiva : Web Application Scanne
    • V3n0M : Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
    • AtScan : Advanced dork Search & Mass Exploit Scanner
    • WPSeku : WordPress Security Scanner
    • Wpscan : A simple WordPress scanner written in python
    • XSStrike : Most advanced XSS scanner.
    • Sqlmap : automatic SQL injection and database takeover tool
    • WhatWeb : the Next generation web scanner
    • joomscan : Joomla Vulnerability Scanner Project
  • Frameworks:
    • Dzjecter : Server checking Tool

Privilege Escalation

  • Tools:
    • Linux penguin :
      • Scripts :
        • linux_checksec.sh
        • linux_enum.sh
        • linux_gather_files.sh
        • linux_kernel_exploiter.pl
        • linux_privesc.py
        • linux_privesc.sh
        • linux_security_test
      • Linux_exploits folder
    • Windows |Windows| :
      • windows-privesc-check.py
      • windows-privesc-check.exe
    • MySql :
      • raptor_udf.c
      • raptor_udf2.c

Reverse Engineering

  • Radare2 : unix-like reverse engineering framework
  • VirtusTotal : VirusTotal tools
  • Miasm : Reverse engineering framework
  • Mirror : reverses the bytes of a file
  • DnSpy : .NET debugger and assembly
  • AngrIo : A python framework for analyzing binaries ( Suggested by @Hamz-a )
  • DLLRunner : a smart DLL execution script for malware analysis in sandbox systems.
  • Fuzzy Server : a Program That Uses Pre-Made Spike Scripts to Attack VulnServer.
  • yara : a tool aimed at helping malware researchers toidentify and classify malware samples
  • Spike : a protocol fuzzer creation kit + audits
  • other : other scripts collected somewhere

Exploitation

  • Findsploit : Find exploits in local and online databases instantly
  • Pompem : Exploit and Vulnerability Finder
  • rfix : Python tool that helps RFI exploitation.
  • InUrlBr : Advanced search in search engines
  • Burpsuite : Burp Suite for security testing & scanning.
  • linux-exploit-suggester2 : Next-Generation Linux Kernel Exploit Suggester
  • other : other scripts I collected somewhere.

Shells

  • WebShells : BlackArch’s Webshells Collection
  • ShellSum : A defense tool – detect web shells in local directories
  • Weevely : Weaponized web shell
  • python-pty-shells : Python PTY backdoors

Password Attacks

  • crunch : a wordlist generator
  • CeWL : a Custom Word List Generator
  • patator : a multi-purpose brute-forcer, with a modular design and a flexible usage

Encryption – Decryption

  • Codetective : a tool to determine the crypto/encoding algorithm used
  • findmyhash : Python script to crack hashes using online services

Social Engineering

  • scythe : an accounts enumerator