├── .idea ├── .name ├── encodings.xml ├── vcs.xml ├── modules.xml ├── ComptiaPorts.iml ├── misc.xml └── workspace.xml ├── ports.py └── programs.py /.idea/.name: -------------------------------------------------------------------------------- 1 | ComptiaPorts -------------------------------------------------------------------------------- /.idea/encodings.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | -------------------------------------------------------------------------------- /.idea/vcs.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | -------------------------------------------------------------------------------- /.idea/modules.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | -------------------------------------------------------------------------------- /.idea/ComptiaPorts.iml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | -------------------------------------------------------------------------------- /.idea/misc.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | -------------------------------------------------------------------------------- /ports.py: -------------------------------------------------------------------------------- 1 | import random 2 | __author__ = 'mantvydas' 3 | 4 | PORTS = [ 5 | ("FTP data", 20), 6 | ("FTP control", 21), 7 | ("SFTP", 22), 8 | ("SCP", 22), 9 | ("SSH", 22), 10 | ("Telnet", 23), 11 | ("SMTP", 25), 12 | ("WINS", 42), 13 | # ("TACACs+", 49), 14 | ("DNS name queries", "u53"), 15 | ("DNS zone transfers", "53"), 16 | # ("TFTP", "u69"), 17 | ("HTTP", 80), 18 | ("Kerberos", "u88"), 19 | ("POP3", 110), 20 | ("Portmapper", 111), 21 | ("NTP (network time protocol)", 123), 22 | ("RPC-DCOM", 135), 23 | ("SNMP (Simple network management protocol)", "u161"), 24 | ("SNMP trap (Simple network management protocol)", "u162"), 25 | ("NetBios", "137-139"), 26 | ("IMAP4", 143), 27 | ("LDAP", 389), 28 | ("HTTPS", 443), 29 | ("CIFS", 445), 30 | ("SMTP (SSL/TLS)", 465), 31 | ("IPSec", "u500"), 32 | ("Syslog", 514), 33 | ("LDAP (SSL/TLS)", 636), 34 | ("IMAP (SSL/TLS)", 993), 35 | ("POP (SSL/TLS)", 995), 36 | ("Socks5", 1080), 37 | ("Nessus Server", 1241), 38 | ("L2TP", "u1701"), 39 | ("MS SQL", 1433), 40 | ("Citrix management", 1494, 2598), 41 | ("Oracle listener", 1521), 42 | ("PP2P", 1723), 43 | ("Global catalog service", 3268), 44 | ("RDP", 3389), 45 | ("IRC", "6662-6667"), 46 | 47 | # trojan ports 48 | ("TCP Wrappers", "421"), 49 | ("Doom", "666"), 50 | ("Snipernet", "667"), 51 | ("Tini", "7777"), 52 | ("WinHole", "1080, 1081"), 53 | ("RAT", "1095, 1097, 1098"), 54 | ("SpySender", "1807"), 55 | ("Deep Throat", "2140, 3150"), 56 | ("NetBus", "12345, 12346"), 57 | ("Whack A Mole", "12362, 12363"), 58 | ("Back Orifice", "31377, 31338"), 59 | 60 | ] 61 | 62 | 63 | def askForNextPort(randomIndex): 64 | print(str(PORTS[randomIndex][0]) + " port?") 65 | 66 | 67 | def captureAnswer(): 68 | return input() 69 | 70 | 71 | def getActualPort(randomIndex): 72 | return str(PORTS[randomIndex][1]) 73 | 74 | 75 | while True: 76 | randomIndex = random.randint(0, PORTS.__len__() - 1) 77 | askForNextPort(randomIndex) 78 | answer = captureAnswer() 79 | portActual = getActualPort(randomIndex) 80 | 81 | if answer == portActual: 82 | print("Correct!") 83 | else: 84 | print("Incorrect! " + portActual) 85 | print() 86 | -------------------------------------------------------------------------------- /programs.py: -------------------------------------------------------------------------------- 1 | import random 2 | __author__ = 'mantvydas' 3 | 4 | class Colours: 5 | HEADER = '\033[95m' 6 | OKBLUE = '\033[94m' 7 | OKGREEN = '\033[92m' 8 | WARNING = '\033[93m' 9 | FAIL = '\033[91m' 10 | ENDC = '\033[0m' 11 | BOLD = '\033[1m' 12 | UNDERLINE = '\033[4m' 13 | 14 | PROGRAMS = [ 15 | # scanning 16 | ("Angry IP Scanner", "[scanning] similar to nmap"), 17 | ("SNScan", "[scanning] Scans network for devices with SNMP"), 18 | ("zenmap", "[scanning] nmap with UI"), 19 | ("NetScan Tools", "[scanning] multipurpose"), 20 | ("hping", "[scanning] packet crafter. Custom scans."), 21 | ("NBTScan", "[scanning, enumeration] NetBios scans"), 22 | ("Zanti", "[scanning] mobile security assesment"), 23 | ("p0f", "[fingerprinting] passive OS fingerprinting"), 24 | 25 | # enumeration 26 | ("DumpSec", "[enumeration] reveal users, groups, printers, etc"), 27 | ("SuperScan", "[enumeration] Windows Enumeration"), 28 | ("Netcat", "multipurpose, can do enumeration"), 29 | ("cryptcat", "netcat with encryption. Good for evading IDS"), 30 | ("showmount", "linux enum, show mounts"), 31 | ("finger", "linux enum, user info"), 32 | ("rpcinfo/rpcclient", "linux enum"), 33 | ("OpUtils 5", "SNMP enumeration"), 34 | ("IP Network Browser", "SNMP enumeration"), 35 | 36 | # passwords 37 | ("L0pthCrack", "[cracking] windows password cracking, auditing"), 38 | ("Ophcrack", "[cracking] windows password cracking, auditing"), 39 | ("Hydra", "[cracking] brute-forcing"), 40 | ("Medusa", "[cracking] brute-forcing"), 41 | ("Rainbow Crack", "[cracking] generates rainbow tables to be used in password cracking"), 42 | ("TRK (Trinity Rescue Kit)", "Passwor resets on local computer"), 43 | ("Brutus", "Old school brute force"), 44 | ("Cain & Abel", "Sniffing, password cracking, MAC spoofing"), 45 | ("ScoopLM", "password cracker, windows authentication traffic sniffer"), 46 | ("KerbCrack", "looks for kerberos traffic for password cracking"), 47 | ("Legion", "password cracking"), 48 | 49 | # sniffers 50 | ("Kismet (Wireless)", "Wireless sniffing and detection tool"), 51 | ("Ntop", "sniffer for unix"), 52 | ("Network Miner", "sniffer, forensically accepted"), 53 | ("EtherApe", "sniffer"), 54 | ("OmniPeek", "sniffer"), 55 | ("Etherflood", "MAC flooding"), 56 | ("Macof", "MAC flooding"), 57 | ("SMAC", "MAC spoofing"), 58 | ("Arpspoof", "Arp spoofing"), 59 | ("WINARPAttacker", "Arp spoofing"), 60 | ("Ufasoft", "Arp spoofing"), 61 | ("Dsniff", "Arp spoofing, sniffing"), 62 | ("ADMutate", "create scripts hard for IDS to understand"), 63 | ("NIDSBench", "fragmentation to bypass IDS"), 64 | ("PaketETH", "Packet generator"), 65 | ("Ferret & Hamster", "Sniffing, sidejacking attack, stealing cookies with sessions"), 66 | 67 | # wifi 68 | ("inSSIDer", "[wireless] network detection and location"), 69 | ("Reaver", "[wireless] WPS brute-force"), 70 | ("NetStumbler", "[wireless] Network detection and location, rogue device detection"), 71 | ("WaveStumbler", "[wireless] Network detection and location"), 72 | ("Bluesnarfer", "[wireless] A Bluetooth bluesnarfing Utility"), 73 | ("aircrack-ng", "[wireless] monitoring, replay, deauth attacks, fake APs, testing, cracking"), 74 | ("AirMagnet", "[wireless] wifi traffic analysis"), 75 | ("WifiPilot", "[wireless] wifi traffic sniffing/analysis"), 76 | ("CommView", "[wireless] wifi traffic analysis"), 77 | ("Bluepot", "[bluetooth] bluetooth honeypot"), 78 | ("Bluesniff", "[bluetooth] discovery"), 79 | ("BlueScanner", "[bluetooth] discovery"), 80 | ("Bt (bluetooth) Browser", "[bluetooth] discovery"), 81 | ("Bt Crawler", "[bluetooth] discovery"), 82 | ("Super Bluetooth", "[bluetooth] pentesting"), 83 | ("BlueBugger, BlueDiver", "[bluetooth] pentesting"), 84 | ("JiWire", "[wireless] traffic analysis"), 85 | ("OpenSignal", "[wireless] traffic analysis"), 86 | ("ChopChop", "WEP cracking"), 87 | ("SkyHook", "[wireless] traffic analysis"), 88 | ("Wigle", "[wireless] network detection, location"), 89 | ("WinDump", "[wireless] network sniffing, analysis"), 90 | ("Silica", "[wireless] network sniffing, vulnerabilities"), 91 | ("AirCheck", "[wireless] network sniffing, vulnerabilities"), 92 | 93 | # tunnelling 94 | ("AckCMD", "Ack tunnelling. Command prompt over ACK."), 95 | ("Loki", "ICMP tunneling. Exploiting covert channels"), 96 | ("007Shell", "tunneling, packet crafting"), 97 | ("NCovert", "tunneling, packet crafting"), 98 | 99 | # android 100 | ("DroidSQLi", "[mobile] Android automated sqli tool"), 101 | ("sqlmapchik", "[mobile] sqlmap GUI for mobile"), 102 | ("SQLite Editor", "[mobile] test sqli in web apps"), 103 | ("HTTP Injector", "[mobile] send modified http requests"), 104 | ("HTTP Tool", "send modified http requests"), 105 | ("Psiphon", "[mobile] VPN for tunnelling traffic"), 106 | ("Wifite", "[mobile] automated wireless cracking"), 107 | ("SuperOneClick", "root android"), 108 | ("Superboot", "root android"), 109 | ("AirMon", "[mobile] monitoring, sensing wifi"), 110 | ("WifiKill", "[mobile] scan network and terminate wireless hosts it discovers"), 111 | ("Kismet [android port]", "wifi scanning, detection, sniffing"), 112 | ("KisMAC", "wifi scanning, detection, sniffing, password cracking. Works on MAC."), 113 | ("dSploit Scripts", "[mobile] pentesting suite - map networks, fingerprint hosts, crack logons, sniffing, mitm, etc. Combined with zANTI"), 114 | ("zANTI", "[mobile] network diagnostics and pentests at the push of a button"), 115 | ("Hackode", "[mobile] pentesting suite on mobile"), 116 | ("AppScanner", "[mobile] application vulnerability scanner"), 117 | ("LanDroid", "[mobile] network info collection"), 118 | ("Network Handbook", "[mobile] network troubleshooting"), 119 | ("Fing", "[mobile] network security evaluation, host detection"), 120 | ("Mobile NM", "[mobile] nmap mobile port"), 121 | ("Shares Finder", "[mobile] a real app"), 122 | ("Packet Generator", "[mobile] a real app"), 123 | ("Packet Capture", "[mobile] a real app"), 124 | ("PacketShark", "[mobile] packet sniffing"), 125 | ("Network Discovery", "[mobile] a real app"), 126 | ("PacketShark", "[mobile] a real app"), 127 | 128 | # session hijacking 129 | ("DroidSheep", "[mobile] session hijack. root required"), 130 | ("FaceNiff", "[mobile] session sniffing/hijack"), 131 | ("SSLstrip", "[mobile] session sniffing/hijack"), 132 | ("Hunt", "session sniffing/hijack"), 133 | ("Firesheep", "session hijacking. Cookies inspection"), 134 | ("T-Sight", "session hijacking"), 135 | ("Paros", "session hijacking, more known as a proxy"), 136 | ("Juggernaut", "session hijacking"), 137 | 138 | 139 | ("AnDOSid", "[mobile] real app"), 140 | ("Easy Packet Blaster", "[mobile] DOS, real app"), 141 | ("WPScan", "[mobile] WP vulnerability scanner"), 142 | ("CCTV Scanner", "[mobile] locate CCTV cameras"), 143 | ("NetCut", "[mobile] test security of firewalls"), 144 | ("UPNP Scanner", "[mobile] find plug'n'play devices on the network"), 145 | 146 | # hardware 147 | ("MiniPwner", "[hardware] sniffing wired/wireless, AP, wifi attacks"), 148 | ("USB RubberyDuck", "[hardware] runs script on the system when plugged (game over)"), 149 | ("Wifi pineapple", "[hardware] wifi honeypot, reconnaissance, MITM, tracking, logging, reporting"), 150 | ("LAN Turtle", "[hardware] sniffing, remote accessing"), 151 | ("AirPCAP", "[hardware] USB dongle for deep wifi packet sniffing/analysis"), 152 | ("UberTooth One", "[hardware] bluetooh detection and analysis"), 153 | ("PwnPad & PwnPhone", "[hardware] tablet/phone for pentesting"), 154 | ("KeyGrabber", "[hardware] usb keylogger"), 155 | 156 | # logs 157 | ("LogParserLizard", "Log analyser"), 158 | ("ALog reader", "Android Log analyser"), 159 | ("Syslog", "Logs for mobile also"), 160 | 161 | # SQLi 162 | ("SQLPing", "Finds databases on the newtork. Can crack passwords"), 163 | ("SQLReconn", "Finds databases on the newtork"), 164 | ("SQL Brute", "sql injection automation"), 165 | ("Pangolin", "sql injection automation"), 166 | ("Havij", "sql injection automation"), 167 | ("Absinthe", "sql injection automation"), 168 | ("Bobcat", "sql injection automation"), 169 | ("SQLninja", "sql injection automation"), 170 | 171 | 172 | # other 173 | ("Orbot", "Proxy from TOR project"), 174 | ("Orweb", "Browser working with Orbot"), 175 | ("EliteWrap", "A trojan wrapper/packer"), 176 | ("Saran Wrap", "A trojan packer for BackOrifice"), 177 | ("Stealth Tool", "Allows hiding trojans"), 178 | ("Firekiller 2000", "A trojan packer"), 179 | ("Restorator", "A trojan packer"), 180 | ("Teflon Oil Patch", "A trojan packer"), 181 | ("Trojan Man", "A trojan packer"), 182 | ("Intellius", "People search utility"), 183 | ("ZabaSearch", "People search utility"), 184 | ("LexisNexis", "[reconn] competitive data search"), 185 | ("Spokeo", "[reconn] people search utility"), 186 | ("Wink", "[reconn] people search utility"), 187 | ("JXplorer", "LDAP searching"), 188 | ("PDQDeploy", "Deploy stuff, plant backdoors"), 189 | ("PhoneSweep from Niksun", "Wardialing"), 190 | ("THC-SCAN", "Wardialing"), 191 | ("ToneLoc", "Wardialing"), 192 | ("TeleSweep", "Wardialing"), 193 | ("WarVox", "Wardialing"), 194 | ("SFind", "NTFS Stream finder"), 195 | ("LNS", "NTFS Stream finder"), 196 | ("Tripwire", "File chande detector, NTFS Stream finder"), 197 | ("FakeGINA", "Keylogger"), 198 | ("Spector Pro", "Keylogger"), 199 | ("Ghost Keylogger", "Real app, keylogger"), 200 | ("IKS Software Keylogger", "Real app, keylogger"), 201 | ("WhoReadMe", "Tracks emails, provides OS info"), 202 | ("CANVAS", "Similar to metasploit"), 203 | ("Coret Impact", "Similar to metasploit, pentest automation"), 204 | ("PDQ deploy / dameware / remote exec", "Remote code execution, deployment"), 205 | ("WinZapper", "covering tracks"), 206 | ("Evidence Eliminator", "covering tracks"), 207 | ("elsave", "covering tracks"), 208 | 209 | # system monitoring 210 | ("SysAnalyzer", "Registry / system monitoring"), 211 | ("Tiny Watcher", "Registry / system monitoring"), 212 | ("Active Registry Monitor", "Registry / system monitoring"), 213 | ("Smart Utility", "Processes / system monitoring"), 214 | ("Service Manager Plus", "Processes / system monitoring"), 215 | ("SIGVERIF", "Verify critical files are signed / not altered"), 216 | ("Tripwire", "Integrity verifier"), 217 | 218 | # site rippers 219 | ("BlackWidow", "Site ripper"), 220 | ("HTTrack", "Site ripper"), 221 | ("WebRipper", "Site ripper"), 222 | ("Teleport Pro", "Site ripper"), 223 | ("GNU Wget", "Site ripper"), 224 | ("Backstreet Browser", "Site ripper"), 225 | 226 | # Trojan Creation Tools 227 | ("Let me rule", "[trojan creation]"), 228 | ("RECUB", "[trojan creation]"), 229 | ("Phatbot", "[trojan creation]"), 230 | ("Amitis", "[trojan creation]"), 231 | ("Zombam.B", "[trojan creation]"), 232 | ("Beast", "[trojan creation]"), 233 | ("Hard-disk killer", "[trojan creation]"), 234 | 235 | # cloud 236 | ("SOASTA Cloud Test", "[cloud] functional and performance testing"), 237 | ("Load Storm", "[cloud] web/mobile load testing"), 238 | ("BlazeMeter", "[cloud] load testing"), 239 | ("Nexpose", "[cloud] vulnerability scanning"), 240 | ("AppThwack", "[cloud] simulator for testing android, ios, web apps on actual devices"), 241 | 242 | # bots & ddos 243 | ("BotPlug", "[DOS] Botnet creation"), 244 | ("R-U-Dead-Yet", "[DOS] similar to LOIC"), 245 | ("Shark", "[DOS] Botnet creation"), 246 | ("PoisonIvy", "[DOS] Botnet creation"), 247 | ("LOIC", "[DDOS] Botnet creation. Anonymous group uses it."), 248 | ("Trinoo", "UDP DDOS, can target multiple IPs"), 249 | ("TNF2k (Tribe Network Flood)", "[DDOS] icmp/syn/udp/smurf attacks"), 250 | ("Stacheldraht", "[DDOS] icmp/syn/udp/smurf attacks"), 251 | ("Jolt2", "[DOS] , IP fragmentation attack"), 252 | ("DoSHTTP", "[DOS] Real app. Can target URL"), 253 | ("UDPFlood", "[DOS] Real app"), 254 | ("Targa", "[DOS] Many attacks in one: land, nuke, teardrop, etc"), 255 | ] 256 | 257 | 258 | def askNext(randomIndex): 259 | print(Colours.OKGREEN + "\n\n" + str(PROGRAMS[randomIndex][0]) + Colours.ENDC) 260 | 261 | 262 | def captureAnswer(): 263 | return input() 264 | 265 | 266 | def getRealAnswer(randomIndex): 267 | print(str(PROGRAMS[randomIndex][1]) + "\n\n\n----------------------------------------------------") 268 | 269 | 270 | while True: 271 | randomIndex = random.randint(0, PROGRAMS.__len__() - 1) 272 | askNext(randomIndex) 273 | answer = captureAnswer() 274 | getRealAnswer(randomIndex) 275 | -------------------------------------------------------------------------------- /.idea/workspace.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 14 | 15 | 16 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 42 | 43 | 44 | 46 | 47 | 52 | 53 | 54 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 | 83 | 84 | 85 | 86 | 87 | 88 | 89 | 90 | 91 | 92 | 93 | 94 | 95 | 96 | 97 | 98 | 99 | 100 | 116 | 117 | 133 | 134 | 152 | 153 | 171 | 172 | 192 | 193 | 214 | 215 | 238 | 239 | 240 | 241 | 242 | 243 | 244 | 245 | 246 | 247 | 255 | 256 | 258 | 259 | 260 | 261 | 262 | 263 | 264 | 265 | 266 | 1446995414434 267 | 270 | 271 | 1447026577920 272 | 276 | 277 | 1447027268758 278 | 282 | 283 | 1447027327899 284 | 288 | 289 | 1447027367123 290 | 294 | 295 | 1459703369908 296 | 300 | 301 | 1459703505186 302 | 306 | 307 | 1461011351599 308 | 312 | 315 | 316 | 317 | 318 | 319 | 320 | 321 | 322 | 323 | 324 | 325 | 326 | 327 | 328 | 329 | 330 | 331 | 332 | 333 | 334 | 335 | 336 | 337 | 338 | 339 | 340 | 341 | 342 | 343 | 344 | 345 | 346 | 347 | 348 | 349 | 350 | 351 | 352 | 353 | 354 | 355 | 356 | 357 | 358 | 359 | 360 | 361 | 362 | 365 | 368 | 369 | 370 | 372 | 373 | 374 | 375 | 377 | 378 | 379 | 380 | 381 | 382 | 383 | 384 | 385 | 386 | 387 | 388 | 389 | 390 | 391 | 392 | 393 | 394 | 395 | 396 | 397 | 398 | 399 | 400 | 401 | 402 | 403 | 404 | 405 | 406 | 407 | 408 | 409 | 410 | 411 | 412 | 413 | 414 | 415 | 416 | 417 | 418 | 419 | 420 | 421 | 422 | 423 | 424 | 425 | 426 | 427 | 428 | 429 | 430 | 431 | 432 | 433 | 434 | 435 | 436 | 437 | 438 | 439 | 440 | 441 | 442 | 443 | 444 | 445 | 446 | 447 | 448 | 449 | 450 | 451 | 452 | 453 | 454 | 455 | 456 | 457 | 458 | 459 | 460 | 461 | 462 | 463 | 464 | 465 | 466 | 467 | 468 | 469 | 470 | 471 | 472 | 473 | 474 | 475 | 476 | 477 | 478 | 479 | 480 | 481 | 482 | 483 | 484 | 485 | 486 | 487 | 488 | 489 | 490 | 491 | 492 | 493 | 494 | 495 | 496 | 497 | 498 | 499 | 500 | 501 | 502 | 503 | --------------------------------------------------------------------------------