|
1 | | -#Ladon 7.5 for Cobalt Strike |
| 1 | +#Ladon 6.6 for Cobalt Strike |
2 | 2 | #author: k8gege |
3 | 3 | #blog: http://k8gege.org/Ladon |
4 | 4 | #github: https://github.com/k8gege |
5 | 5 | #teston: CS 3.x & 4.0 |
6 | | -#update: 20201010 |
| 6 | +#update: 20200606 |
7 | 7 |
|
8 | 8 | #Some functions are not compatible with CS, please use exe version |
9 | | -#Not Support: [NbtScan VncScan MysqlScan OracleScan SSHscan WinrmScan] |
10 | | -#Not Support: [SubDomain PsExec WinrmExec DumpLsass RdpHijack cve-2020-0688] |
11 | | - |
12 | | -beacon_command_register( |
13 | | -"Ladon", |
14 | | -"Ladon large network penetration scanner", |
15 | | -"\nUsing: Ladon help\nLadon is a multi-threaded plug-in comprehensive scanning artifact for large-scale network penetration, including port scanning, service identification, network assets, password explosion, high-risk vulnerability detection and one click getshell. It supports batch a / B / C segment scanning and cross network segment scanning, as well as URL, host and domain name list scanning. Version 7.2 has built-in 94 function modules and 18 external modules. Through a variety of protocols and methods, it can quickly obtain the IP, computer name, working group, shared resources, network card address, operating system version, website, subdomain name, middleware, open service, router, database and other information of the target network"); |
| 9 | +#Brute-Force Not Support [VncScan MysqlScan OracleScan SSHscan] PassWord |
16 | 10 |
|
17 | 11 | alias Ladon { |
18 | 12 | if (-exists script_resource("Ladon.exe")) { |
19 | 13 | if ($2 eq "help"){ |
20 | | - blog2($1, "Ladon 7.5"); |
| 14 | + blog2($1, "Ladon 6.6"); |
21 | 15 | blog2($1, "Usage:"); |
22 | 16 | #blog2($1, "Ladon 1"); |
23 | 17 | blog2($1, "Ladon ip"); |
24 | 18 | blog2($1, "Ladon ip scantype"); |
25 | | - #blog2($1, "Ladon noping"); |
26 | | - blog2($1, "Ladon noping ip"); |
27 | | - blog2($1, "Ladon noping ip scantype"); |
| 19 | + #blog2($1, "Ladon nocheck"); |
| 20 | + blog2($1, "Ladon nocheck ip"); |
| 21 | + blog2($1, "Ladon nocheck ip scantype"); |
28 | 22 | blog2($1, "ScanType:(Discover/Brute/Encode/Exploit)"); |
29 | 23 | blog2($1, "ip: [ip ip/24 ip/26 ip/8]"); |
30 | 24 | blog2($1, "Discover: [OnlineIP OnlinePC OSscan CiscoScan]"); |
31 | 25 | blog2($1, "Discover: [WebScan WebScan2 SameWeb UrlScan WhatCMS WebDir SubDomain HostIP DomainIP]"); |
32 | 26 | blog2($1, "Vulnerable: [MS17010 SmbGhost WeblogicPoc PhpStudyPoc ActiveMQPoc TomcatPoc Struts2Poc]"); |
33 | 27 | blog2($1, "Vulnerable: [WeblogicExp TomcatExp]"); |
34 | | - blog2($1, "Brute-Force: [LdapScan FtpScan WmiScan SmbScan NbtScan LdapScan SmbHashScan WmiHashScan]"); |
35 | | - blog2($1, "Discover: [EnumMssql EnumShare EnumIIS EnumProcess GetCmdLine GetInfo GetInfo2 GetPipe GetHtml AdiDnsDump]"); |
| 28 | + blog2($1, "Brute-Force: [LdapScan FtpScan WmiScan SmbScan LdapScan VncScan SmbHashScan WmiHashScan]"); |
| 29 | + blog2($1, "Discover: [EnumMssql EnumShare EnumIIS EnumProcess GetCmdLine GetInfo GetInfo2 GetHtml AdiDnsDump]"); |
36 | 30 | blog2($1, "Encode: [EnHex DeHex EnBase64 DeBase64]"); |
37 | 31 | blog2($1, "Sinffer: [[Sniffer FtpSniffer HttpSniffer HttpDownload FtpDownload]]"); |
38 | | - blog2($1, "RemoteExec: [AtExec WmiExec SshExec JspShell WebShell]"); |
| 32 | + blog2($1, "RemoteExec: [PsExec AtExec WmiExec SshExec JspShell WebShell]"); |
39 | 33 | blog2($1, "GetInfo: [CheckDoor EnableDotNet GetIP GetHtml WebSer]"); |
40 | | - blog2($1, "Elevate: [MS16135 BypassUAC GetSystem Runas RunPS SweetPotato BadPotato]"); |
| 34 | + blog2($1, "Elevate: [BypassUAC GetSystem Runas RunPS]"); |
41 | 35 | blog2($1, "Example: Ladon 192.168.1.8/24 OnlinePC"); |
42 | 36 | blog2($1, "Example: Ladon 192.168.1.8/24 *.ini"); |
43 | 37 | blog2($1, "Example: Ladon 192.168.1.8/24 *.ps1"); |
|
0 commit comments