Sponsored
Ethical Hacking

RedRabbit – Pentesting & Post-Exploitation For Red Team

Hey Folks, today we have brought a tool that will help in gathering and extracting information, encoding / decoding and cracking. RedRabbit is a PowerShell script aimed at helping pentesters conduct ethical hacking and at the same time it can be used for red team operation. The aim is to highlight just how Powerful PowerShell is and how it can be used against you (Ethically).

Let’s take a look πŸ˜› !!

Boot PowerShell

We think most of the people would be well aware of the powershell prompt as it works like CMD prompt. We need to run it with administrative privileges.

Tool Installation

So we will use the β€œWebClient” service to download and run this tool directly at the PowerShell prompt.

iex(New-Object Net.WebClient).DownloadString("https://raw.githubusercontent.com/securethelogs/RedRabbit/master/RedRabbit.ps1")

COOL πŸ˜› !! As you can see how easily we have setup this tool in our windows machine. After that type β€œh” on the terminal of this tool and all the features will be in front of you.

Quick Recon

Let’s choose the first option and check if it works.

Works πŸ˜› !! As soon as we select the first option, it dumps all the details related to administrator, system, directory and network.

Also it gives us information related to firewall rules and smb share service.

Subnet Scanner

This option of this tool works like the nmap tool of kali linux because we can get the details of open ports of all the available hosts in a network.

SMB Scanner

If you want to get the information of network file sharing protocol (SMB), you can choose the third option.

Results πŸ˜› !! If a host is vulnerable or the tool are able to communicate with it then it will dump all the data available there to the terminal.

Password Extractions

You can dump all the saved credentials in the system using the following option of this tool.

Nice πŸ˜› !! As you can see we got all the saved wireless keys.

Encoding and Decoding

Encoding and decoding is the most important part in the ethical hacking and red team that you can also do through this tool.

Reverse Shell

To obtain the system’s reverse shell, you need to enter the IP address and port number of the kali linux where the netcat listener is placed.

Aamazing πŸ˜› !! As soon as you enter the IP address and port, the attacker will get complete control of the target machine.

Social Username

In addition, you can hunt some usernames with this tool.

End πŸ˜› !! We have marked only the important feature of this tool because it has too many features that we cannot cover in a single article.

About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
Sponsored

Recent Posts

Gau (GetAllUrls) – Find Known and Hidden URL

The gau (Get All URLs) tool is a versatile open-source utility that collects URLs from…

3 months ago

Jsluicepp – Burp Extension for JS Secrets – BugBountyTip

Jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic…

8 months ago

Bypassing Firewalls (WAF) with XSS Payloads

Hey Folks :) !! In this tutorial, we will describe some of the techniques commonly…

8 months ago

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 year ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

2 years ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

3 years ago
Sponsored

This website uses cookies.