Kali Linux 2017.2 – New Tools Overview

Kali 2017 new tools

Last week, Kali announced the release of Kali Linux 2017.2! The new version is a collection of all updates and fixes since the last release, but also includes several new tools. In this article we will see what new tools were installed and take a closer look at some of them.

Note: The tools are not installed automatically, but are available from the repositories. So, to use them, you will need to ‘apt-install’ the ones you want.

New tools

  • APT2
  • B374K
  • BloodHound
  • BruteSpray
  • ChangeMe
  • CrackMapExec
  • CredDump7
  • Crowbar
  • Dbeaver
  • hURL
  • Phishery
  • RedSnarf
  • Secure-Socket-Funneling
  • SSH-Audit
  • Tinfoleak
  • Wgetpaste

Let’s take a closer look at some of the tools.

APT2 – An Automated Penetration Testing Toolkit

Website: https://github.com/MooseDojo/apt2

Kali 2017.2 New Tools 1

APT2 performs an NMap scan (or import scans from Nexpose, Nessus, or NMap) and launches enumeration modules and exploits against the target. Options are set in the “default.cfg” file:

Kali 2017.2 New Tools 2

Quick Usage

  • Start Metasploit and run the following command:

load msgrpc User=msf Pass=msfpass ServerPort=55552

Kali 2017.2 New Tools 3

This is needed as when APT2 runs, it it is able to open any remote sessions they will show up in Metasploit.

Then launch APT2 against a target:

apt2 -v -s 1 -b –target 192.168.1.135

The program scans the target, and will automatically begin to attack the target based on the safety level (-s) that you choose.

Any vulnerabilities are listed, and reports are saved to the designated directory:

Kali 2017.2 New Tools 4

A html report file is saved in the “Reports” folder. The “proofs” folder contains a lot of information and results from the scan:

Kali 2017.2 New Tools 5

 

BruteSpray – Service Brute Force tool

Website: https://github.com/x90skysn3k/brutespray

Kali 2017.2 New Tools 6

BruteSpray takes nmap GNMAP/XML output and automatically brute-forces services with default credentials using Medusa.

Quick Usage

Run nmap scan and save output, then start Brutespray in interactive mode:

brutespray –file nmap.xml -i

Kali 2017.2 New Tools 7

You can also run it in manual mode by supplying specific information using switches. See the help file or tool website for more information.

Crowbar

Website: https://github.com/galkan/crowbar

Kali 2017.2 New Tools 8

A brute forcing tool that supports OpenVPN, Remote Desktop Protocol, SSH Private Keys and VNC Keys.

Quick Usage

RDP target with known user and password:

crowbar -b -rdp -s 192.168.1.204/32 -u test -c monkey

Kali 2017.2 New Tools 9

Crowbar can be run against a single target or range of targets. It can use individual passwords, password lists and SSH or VNC keys. See tool website for more examples.

Redsnarf

Tool website: https://github.com/nccgroup/redsnarf

Kali 2017.2 New Tools 10

Redsnarf is a pen-testing / red-teaming tool by Ed Williams for retrieving hashes and credentials from Windows workstations, servers and domain controllers

Redsnarf looks like a very useful tool that has a ton of features.  It targets Windows computers and can pull information from the system, recover passwords, enable remote access, run remote shells and much more.

I ran it against a local test Windows 7 desktop system, and it would only run when UAC was totally disabled on the system. So, this seems to be a great post-exploitation tool.

Quick Usage

Information dump with a known admin user name and password:

redsnarf -H ip=192.168.1.93 -u dan -p password

Kali 2017.2 New Tools 11

Information including passwords and shares is displayed and saved to the log directory.

Remote Command shell

Redsnarf has the capability to create several different types of shells.

redsnarf -H ip=192.168.1.93 -u dan -p password -d WIN-42ORBM3SRVF -uD y

Running the command above will connect to the target system and list available shells, as seen below:

Kali 2017.2 New Tools 12

Stealth Mimikatz

The Stealth Mimikatz option is pretty interesting. It creates a webserver on the target system, pulls the system creds and downloads them in plain text:

redsnarf -H ip=192.168.1.93 -u dan -p password -d WIN-42ORBM3SRVF -hR y

Kali 2017.2 New Tools 13

Logging

Whenever you run a command, the program provides you with a directory that contains the program logs. The logs contain a lot of important information gleaned from the system:

Kali 2017.2 New Tools 14

Conclusion

In this article we discussed a few of the new tools included with Kali Linux. Kali Linux is the most feature rich computer security testing platform available and it continues to grow as new tools and capabilities are constantly added.

If you are new to Kali or a seasoned user interested in learning more, check out my “Security Testing with Kali Linux” book series:

Basic Security Testing with Kali Linux

Intermediate Security Testing with Kali Linux

Security Testing with Kali NetHunter

And keep an eye out for the upcoming, “Advanced Security Testing with Kali Linux”.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.