@@ -71,6 +71,7 @@ For beginner:
71
71
* [ enum4linux] ( https://tools.kali.org/information-gathering/enum4linux )
72
72
* [ Nikto] ( https://tools.kali.org/information-gathering/nikto )
73
73
* [ Nmap] ( https://tools.kali.org/information-gathering/nmap )
74
+ * [ nmap_vulners] ( https://github.com/vulnersCom/nmap-vulners )
74
75
* [ OpenVAS] ( https://tools.kali.org/vulnerability-analysis/openvas )
75
76
* [ Skipfish] ( https://tools.kali.org/web-applications/skipfish )
76
77
* [ sslscan] ( https://github.com/rbsec/sslscan )
@@ -112,7 +113,7 @@ For beginner:
112
113
113
114
# # Usage
114
115
115
- 1. Check the OpenVAS admin user and password set them in the pakuri.conf file :
116
+ 1. Register the OpenVAS administrator user and password in pakuri.conf:
116
117
117
118
` ` ` shell
118
119
root@kali:~ # vim /usr/share/PAKURI/pakuri.conf
@@ -123,14 +124,14 @@ For beginner:
123
124
OMPPASS="admin"
124
125
` ` `
125
126
126
- 2. Start Faraday-Server and set workspace:
127
+ 2. Faraday-server is started. After starting up, access from your browser and register your workspace:
127
128
128
129
` ` ` shell
129
130
root@kali:~ # systemctl start faraday-server.service
130
131
root@kali:~# firefox localhost:5985
131
132
` ` `
132
133
133
- 3. Set Workspace in the pakuri.conf file.
134
+ 3. Register the workspace you just registered in pakuri.conf:
134
135
135
136
` ` ` shell
136
137
root@kali:~ # vim /usr/share/PAKURI/pakuri.conf
@@ -150,47 +151,14 @@ For beginner:
150
151
151
152
` ` ` shell
152
153
root@kali:/usr/share/PAKURI# ./pakuri.sh
153
- ____ ____ ____ ____ ____ ____
154
- || P ||| A ||| K ||| U ||| R ||| I ||
155
- || __||| __||| __||| __||| __||| __||
156
- | /__\| /__\| /__\| /__\| /__\| /__\|
157
- v1.1.0
158
- Author : Mr.Rabbit
159
- inspired by CDI
160
-
161
- Workspace: demo
162
- ---------- Main Menu -----------
163
- +---+
164
- | 1 | Scanning
165
- +---+
166
- +---+
167
- | 2 | Exploit
168
- +---+
169
- +---+
170
- | 3 | Config
171
- +---+
172
- +---+
173
- | 4 | Assist
174
- +---+
175
- +---+
176
- | 9 | Back
177
- +---+
178
154
` ` `
155
+ ! [startup](https://user-images.githubusercontent.com/16553787/79108773-0c40a500-7d45-11ea-9cf3-fe01cdc1df97.gif)
156
+ PAKURI is not fully automated and requires the user interactions, to make sure to proceed the pentest and to avoid any unintended attack or trouble.
179
157
180
- PAKURI is not fully automated and requires the user interactions, to make sure to proceed the pentest and to avoid any unintended attack or trouble.
181
-
182
- # ## Scanning
183
-
184
- ! [scanning](https://user-images.githubusercontent.com/16553787/71568958-dc132480-2b0e-11ea-97b0-13989b045ce2.png)
185
-
186
- # ## Exploit
187
-
188
- ! [exploit](https://user-images.githubusercontent.com/16553787/71568975-0238c480-2b0f-11ea-9092-010b78e34bd1.png)
189
-
190
- # ## Config
191
-
192
- ! [config](https://user-images.githubusercontent.com/16553787/71568995-1ed4fc80-2b0f-11ea-9afe-315a055b8a76.png)
158
+ ---
193
159
160
+ # # Keypad Operation
161
+ ! [keypad_op](https://user-images.githubusercontent.com/16553787/79107440-5f652880-7d42-11ea-9206-fbc9908089a1.gif)
194
162
By operating the numeric keypad, it is possible to scan the network, scan for vulnerabilities, and perform simple pseudo attacks.
195
163
196
164
---
0 commit comments