backtrack-scripts - Custom bash scripts used to automate various pentesting tasks


Designed for use with BackTrack 5 R3 gnome.

Updated on Dec 4
  • Fixed bug - NSE wrong port number. 100,000 to 10,000.
  • Fixed bug - forgot to create resource file telnet2.rc.
  • Removed auxiliary/scanner/mysql/mysql_authbypass_hashdump from resource file mysql.rc.
  • Removed auxiliary/scanner/http/tomcat_mgr_login from resource file tomcat.rc.
Dec 3
  • Added auxiliary/scanner/ntp/ntp_readvar to resource file ntp.rc.
  • Added setg RPORT to most resource files.
  • Fixed a bug in the parsing when running Ping Sweep. Some hosts reply with FQDN and IP, while others only reply with IP.
  • Fixed a bug in the Voldemort NSE where it was reading from the wrong file.
  • Removed port 587 tcp from all scans as it pertains to Gmail and not SMTP.
  • Split NSE for SMTP into SMTP and SMTP/S.
  • Split resource file db2.rc into two files, db2.rc for port 523 and db2-version.rc for port 50000.
  • Split resource file oracle.rc into two files, oracle.rc for port 1158 and oracle2.rc for port 1521.
  • Split resource file smtp.rc into two files, smtp.rc for port 25 and smtp-s.rc for port 465.
  • Split resource file telnet.rc into two files, telnet.rc for port 23 and telnet2.rc for port 9999.
How to use the Back-track script 

1. Download scripts to the proper location.
svn co https://backtrack-scripts.googlecode.com/svn/ /opt/scripts
2. Set permissions.
chmod +x /opt/scripts/ -R
3. Run the setup script.
cd /opt/scripts/
./setup.sh


4. Exit Terminal and open a new one. Run the new alias to update the distro and commonly used applications. This should be ran daily.
update
5. Run the main application.
./discover.sh
______  ___ ______ ______  _____  _    _ ______  _____|     \  |  |____  |      |     |  \  /  |_____ |____/
|_____/ _|_ _____| |_____ |_____|   \/   |_____ |    \_
By Lee Baird


RECON
- Names, emails, URLs, whois, DNS, traceroute and load balancing.
1.  Open Source Intelligence Gathering
2.  Scrape

DISCOVER
- Host discovery, port scanning, service enumeration and OS
identification
using Nmap, Nmap scripts and Metasploit scanners.
3.  Ping Sweep
4.  Single IP, URL or Range
5.  Local Area Network
6.  List
7.  CIDR Notation

WEB
8.  Open multiple tabs in Firefox
9.  Nikto
10. SSL Check

MISC
11. Crack WiFi
12. Reinstall nmap 13. Start a Metasploit listener14. Exit

Open Source Intelligence Gathering.
1.  Company
2.  Person
3.  Previous menu

Scrape
1.  Passive
2.  Active
3.  Previous menu

Open multiple tabs in Firefox with:
1.  List containing IPs and/or URLs.
2.  Directories from a domain's robot.txt.
3.  Previous menu
Feel free to contact with any feedback that you may have via email or GTalk: leebaird@gmail.com
Source-
http://code.google.com/p/backtrack-scripts/
Wiki -
http://code.google.com/p/backtrack-scripts/w/list
For more information -
http://www.irongeek.com/i.php?page=videos/aide2012/setting-up-backtrack-and-automating-various-tasks-with-bash-scripts-lee-baird