Skip to content

3rdn4Li/ScriptKidAgent

Repository files navigation

Installation

cd /path/to/ScriptKidAgent/agentlib
pip install -e .
cd /path/to/ScriptKidAgent
pip install -e .

You should ensure that there is metasploit and nmap are in the host machine. The more pre-installed tools are in the host, the better performance scriptkid can achieve (just like a real scriptkid)! For example, curl and searchsploit are recommended.

Usage

scriptkid --ip_segment [ip_segment]

for example,

scriptkid --ip_segment 127.0.0.1

Test metasploitable2&3 for example

setup scriptkid docker

docker build -t scriptkid:latest .

docker run --name scrikptkid \
-it --rm \
--pull never --privileged \
--network pentest \
--env-file=.env \
--entrypoint /bin/bash \
scriptkid:latest

setup metasploitable 2&3

  • metasploitable2
# create docker network for metasploitable2
docker network create --subnet=172.19.0.0/16 --gateway=172.19.0.1 scriptkid 
docker pull tleemcjr/metasploitable2
docker run --network=pentest --ip 172.19.0.2 -h victim -d --rm --name metasploitable2 tleemcjr/metasploitable2
#docker run --network=pentest --ip 172.19.0.3 -h victim3 -d --rm --name metasploitable3 heywoodlh/vulnerable
# check ip
docker inspect -f '{{range .NetworkSettings.Networks}}{{.IPAddress}}{{end}}' metasploitable2
  • metasploitable3
# metasploitable3 with vagrant
cd metasploitable3-workspace
vagrant up
# test
nmap 192.168.56.10 # should be able to see the open ports now

evaluate scriptkid

You can use the ip to replace the ip_segment

scriptkid --ip_segment 172.19.0.2 # for metasploitable2
scriptkid --ip_segment 192.168.56.10 # for metasploitable3

unittest

test_execute_command_success

# in metasploitable
# run ifconfig to get the ip address
# use the ip address to replace the ip

Then run

python -m unittest discover tests

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 3

  •  
  •  
  •