Habu: Python Network Hacking Toolkit
These are essential capacities that assist with a few undertakings for Ethical Hacking and Penetration Testing. A great part of the capacities are truly essential (like get our open IP address), however are truly valuable sometimes.
Almost all commands implement the verbose mode with the ‘-v’ option. This can give you some extra info about what habu is doing.
This command sends ARP ‘is-at’ packets to each victim, poisoning their ARP tables for send the traffic to your system.
This command listen for ARP packets and shows information each device.
This command tries to connect to various services and check if you can reach them using your internet connection.
This command send a DHCP request and shows what devices has replied. Using the ‘-v’ parameter (verbose) you can see all the options (like DNS servers) included on the responses.
This command prints the EICAR test string that can be used to test antimalware engines.
This command computes various hashes for the input data, that can be a file or a stream.
This command prints your current public IP based on the response from https://api.ipify.org.
This command creates TCP connections and prints the TCP initial sequence numbers for each connections.
This command implements the LAND attack, that sends packets forging the source IP address to be the same that the destination IP. Also uses the same source and destination port. The attack is very old, and can be used to make a Denial of Service on old systems, like Windows NT 4.0. More
This command implements the classic ‘ping’ with ICMP echo requests.
This command launches snmp-get queries against an IP, and tells you when finds a valid community string (is a simple SNMP cracker). The dictionary used is the distributed with the onesixtyone tool
This command launches a lot of TCP connections and keeps them opened. Some very old systems can suffer a Denial of Service with this.
This command send TCP packets with different flags and tell you what responses receives. It can be used to analyze how the different TCP/IP stack implementations and configurations responds to packet with various flag combinations.
Habu requires:
- Click
- Python (3.x),
- Scapy-Python3
- Matplotlib (Optional, only needed if you want to make some graphs)
Verbose Mode
Almost all commands implement the verbose mode with the ‘-v’ option. This can give you some extra info about what habu is doing.Some Essential Commands:
- habu.arpoison: ARP Poisoning
This command sends ARP ‘is-at’ packets to each victim, poisoning their ARP tables for send the traffic to your system.
- habu.arpsniff: Discover devices on your LAN capturing ARP packets
This command listen for ARP packets and shows information each device. - habu.contest: Check your connection capabilities
This command tries to connect to various services and check if you can reach them using your internet connection. - habu.dhcp_discover: Discover DHCP servers
This command send a DHCP request and shows what devices has replied. Using the ‘-v’ parameter (verbose) you can see all the options (like DNS servers) included on the responses.
- habu.eicar: Prints the EICAR test string
This command prints the EICAR test string that can be used to test antimalware engines. - habu.hasher: Computes various hashes with the input data
This command computes various hashes for the input data, that can be a file or a stream. - habu.ip: Prints your current public IP
This command prints your current public IP based on the response from https://api.ipify.org. - habu.isn: Prints the TCP sequence numbers for an IP
This command creates TCP connections and prints the TCP initial sequence numbers for each connections. - habu.land: Implements the LAND attack
This command implements the LAND attack, that sends packets forging the source IP address to be the same that the destination IP. Also uses the same source and destination port. The attack is very old, and can be used to make a Denial of Service on old systems, like Windows NT 4.0. More - habu.ping: ICMP echo requests
This command implements the classic ‘ping’ with ICMP echo requests. - habu.snmp_crack: SNMP Community Cracker
This command launches snmp-get queries against an IP, and tells you when finds a valid community string (is a simple SNMP cracker). The dictionary used is the distributed with the onesixtyone tool - habu.synflood: SYN Flood Attack Implementation
This command launches a lot of TCP connections and keeps them opened. Some very old systems can suffer a Denial of Service with this. - habu.tcpflags: TCP Flag Fuzzer
This command send TCP packets with different flags and tell you what responses receives. It can be used to analyze how the different TCP/IP stack implementations and configurations responds to packet with various flag combinations.Source: www.ehacking.net
Habu: Python Network Hacking Toolkit
Reviewed by Anonymous
on
5:57 AM
Rating: