Hey Folks, today in this tutorial we have an amazing tool for all of you which can give you fake spoof log by generating. pwnSpoof (from Punk Security) generates realistic spoofed log files for common web servers with customisable attack scenarios. Every log bundle is unique and completely customisable, making it perfect for generating CTF scenarios and for training serials.
Letโs take a look ๐ !!
It is quite easy to deploy this tool in any kali linux operating system. First we need to clone the repository from Github via git clone command, enter the directory and thatโs it. Now we can operate this tool with the help of โpython3โ utility.
git clone https://github.com/punk-security/
cd pwnspoof
python pwnspoof.py --help
Hmm ๐ !! Like other tools, it also has a help command which we can use to find the use case of this tool.
Weโre excited to see how impressive results we get with this tool. So first we try to generate fake IIS logs against a website and we get success. As you can see below it has generated all the logs in order which looks very real.
python3 pwnspoof.py banking --server-fqdn test.php.com --attack-type bruteforce --server-type IIS --out iis.log
You can also specify your server name if you want to generate server wise logs.
python3 pwnspoof.py banking --server-fqdn test.php.com --attack-type command_injection --server-type NGINX
This feature will allow us to create spoof logs with different IP addresses so that the logs look impressive.
python3 pwnspoof.py banking --spoofed-attacks 3 --iocs
The gau (Get All URLs) tool is a versatile open-source utility that collects URLs from…
Jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic…
Hey Folks :) !! In this tutorial, we will describe some of the techniques commonly…
Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…
Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…
Hey Folks, we are back today after such a long break, but don't worry we…
This website uses cookies.