[go: up one dir, main page]

Skip to content
/ LadonGo Public

Ladon for Kali 全平台开源内网渗透扫描器,Windows/Linux/Mac/路由器内网渗透,使用它可轻松一键批量探测C段、B段、A段存活主机、高危漏洞检测MS17010、SmbGhost,远程执行SSH/Winrm,密码爆破SMB/SSH/FTP/Mysql/Mssql/Oracle/Winrm/HttpBasic/Redis,端口扫描服务识别PortScan指纹识别/HttpBanner/HttpTitle/TcpBanner/Weblogic/Oxid多网卡主机,端口扫描服务识别PortScan。

License

Notifications You must be signed in to change notification settings

k8gege/LadonGo

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

80 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Ladon Scanner For Golang

Wiki

http://k8gege.org/Ladon/LadonGo.html

Author Ladon Bin GitHub issues Github Stars GitHub forks GitHub license Downloads

Introduction

LadonGo is an open source intranet penetration scanner framework, which can be used to easily detect segment C, B, A live hosts, fingerprint identification, port scanning, password explosion, remote execution, high-risk vulnerability detection, etc. Version 4.0 includes 37 functions, high risk vulnerability detection MS17010, SmbGhost, remote execution of SshCmd, WinrmCmd, PhpShell, JspShell, GoWebShell, L, 12 protocol password explosion Smb/Ssh/Ftp/Mysql/Mssql/Oracle/Sqlplus/Winrm/HttpBasic/Edits/MongoDB/RouterOS, survival detection/information collection/fingerprint identification NbtInfo, OnlinePC, Ping, Icmp, SnmpScan, HttpBanner, HttpTitle, TcpBanner, WeblogicScan, O xidScan, Port scan / service probe portscan, forward to Socks5 proxy< br>

LadonGO 5.2 Pentest Scanner framework 全平台Go开源内网渗透扫描器框架,Windows/Linux/Mac内网渗透,使用它可轻松一键批量探测C段、B段、A段存活主机、高危漏洞检测MS17010、SmbGhost,远程执行SSH/Winrm,密码爆破SMB/SSH/FTP/Mysql/Mssql/Oracle/Winrm/HttpBasic/Redis,端口扫描服务识别PortScan指纹识别/HttpBanner/HttpTitle/TcpBanner/Weblogic/Oxid多网卡主机,端口扫描服务识别PortScan。

Development environment

OS: Kali 2019 X64

IDE: Mousepad

Go: 1.13 Linux

Function module

Detection

. .
OnlinePC (Using ICMP/SNMP/Ping detect Online hosts)
PingScan (Using system ping to detect Online hosts)
IcmpScan (Using ICMP Protocol to detect Online hosts)
SnmpScan (Using Snmp Protocol to detect Online hosts)
HttpBanner (Using HTTP Protocol Scan Web Banner)
HttpTitle (Using HTTP protocol Scan Web titles)
T3Scan (Using T3 Protocol Scan Weblogic hosts)
PortScan (Scan hosts open ports using TCP protocol)
TcpBanner (Scan hosts open ports using TCP protocol)
OxidScan (Using dcom Protocol enumeration network interfaces)
NbtInfo (Scan hosts open ports using NBT protocol)

VulDetection

. .
MS17010 (Using SMB Protocol to detect MS17010 hosts)
SmbGhost (Using SMB Protocol to detect SmbGhost hosts)
CVE-2021-21972 (Check VMware vCenter 6.5 6.7 7.0 Rce Vul)
CVE-2021-26855 (Check CVE-2021-26855 Microsoft Exchange SSRF)

BruteForce

. .
SmbScan (Using SMB Protocol to Brute-For 445 Port)
SshScan (Using SSH Protocol to Brute-For 22 Port)
FtpScan (Using FTP Protocol to Brute-For 21 Port)
401Scan (Using HTTP BasicAuth to Brute-For web Port)
MysqlScan (Using Mysql Protocol to Brute-For 3306 Port)
MssqlScan (Using Mssql Protocol to Brute-For 1433 Port)
OracleScan (Using Oracle Protocol to Brute-For 1521 Port)
MongodbScan (Using Mongodb Protocol to Brute-For 27017 Port)
WinrmScan (Using Winrm Protocol to Brute-For 5985 Port)
SqlplusScan (Using Oracle Sqlplus Brute-For 1521 Port)
RedisScan (Using Redis Protocol to Brute-For 6379 Port)

RemoteExec

. .
SshCmd (SSH Remote command execution Default 22 Port)
WinrmCmd (Winrm Remote command execution Default 5985 Port)
PhpShell (Php WebShell command execution Default 80 Port)
GoWebShell (Go WebShell Default http://IP:888/web)
WinJspShell (JSP Shell Remote command execution Default 80 Port)
LnxJspShell (JSP Shell Remote command execution Default 80 Port)
LnxRevShell (Bash Reverse Shell)

Exploit

. .
PhpStudyDoor (PhpStudy 2016 & 2018 BackDoor Exploit)
CVE-2018-14847 (Export RouterOS Password 6.29 to 6.42)

Socks5

. .
Socks5 (Socks5 forward proxy server)

Build

go get github.com/k8gege/LadonGo
go build Ladon.go

Make

make windows
make linux
make mac

Install

Linux/Mac

make install

Windows

go run install.go

Usage

help

Ladon FuncList
Ladon Detection
Ladon VulDetection
adon BruteFor
Ladon RemoteExec
Ladon Exploit
Ladon Example

Usage

Ladon IP/pcname/CIDR/URL/txt moudle

Ladon 192.168.1.8 MS17010
Ladon 192.168.1.8/24 MS17010
Ladon 192.168.1/c MS17010
Ladon 192.168/b MS17010
Ladon 192/a MS17010

Ladon 192.168.1-192.168.5 MS17010
Ladon http://192.168.1.8:8080 BasicAuthScan
Ladon ip.txt MS17010
Ladon url.txt HttpBanner

Examples

Forward Socks5 proxy server

Ladon Socks5 192.168.1.8 1080

Information collection and vulnerability detection

Ping scan segment C live hosts (with any permission) < br >

Ladon 192.168.1.8/24 PingScan

ICMP scanning section C survival host (administrator authority)

Ladon 192.168.1.8/24 IcmpScan

SNMP scanning of surviving hosts and devices in Segment C

Ladon 192.168.1.8/24 SnmpScan

SMB scans C-segment eternal blue ms17010 vulnerable hosts < br >

Ladon 192.168.1.8/24 MS17010

SMB scans C-segment eternal black smbghost vulnerability host < br >

Ladon 192.168.1.8/24 SmbGhost

T3 scans the hosts with open WebLogic in Segment C

Ladon 192.168.1.8/24 T3Scan

HTTP scanning C-segment open Web site Banner

Ladon 192.168.1.8/24 BannerScan

HTTP scanning section C open Web site title

Ladon 192.168.1.8/24 HttpTitle

TCP scans the open port service information of section C. < br >

Ladon 192.168.1.8/24 TcpBanner

TCP scans common open ports of segment C hosts

Ladon 192.168.1.8/24 PortScan

Password explosion, weak password

Scan weak password of windows machine on port 445 of section C. < br >

Ladon 192.168.1.8/24 SmbScan

Scan the SSH weak password of the 22 port Linux machine in section C

Ladon 192.168.1.8/24 SshScan

Scan the weak password of FTP server on port 21 of section C. < br >

Ladon 192.168.1.8/24 FtpScan

Scan the weak password of MySQL server on port 3306 in section C

Ladon 192.168.1.8/24 MysqlScan

Scan weak password of Oracle server on port 1521 in segment C

Ladon 192.168.1.8/24 OracleScan

Scan the weak password of MongoDB server on port 27017 in section C

Ladon 192.168.1.8/24 MongodbScan

Scan weak password of Oracle server on port 1521 of section C. < br >

Ladon 192.168.1.8/24 SqlplusScan

Scan section C 5985 port Winrm server weak password

Ladon 192.168.1.8/24 WinrmScan

Scan the empty password of redis server on port 6379 of section C. < br >

Ladon 192.168.1.8/24 RedisScan

Scan C-segment 8728 port Routeros router < br >

Ladon 192.168.1.8/24 RouterOSScan

Remote command execution
Ladon SshCmd host port user pass cmd
Ladon WinrmCmd host port user pass cmd
Ladon PhpShell url pass cmd
Ladon PhpStudyDoor url cmd

SshCmd & WinrmCmd image

PhpShell & PhpStudyDoor image

SCAN IP/24 (192.168.1/c)

. . .
ICMP 3ms 1/20s
WebTitle 10ms 1/6s
T3Scan 15ms 1/4s
EthScan 2ms 1/30s

Scan B(192.168/b)

. . .
EthScan 23Min 1 Port
T3Scan 1h 4 Port
WebTitle 40Min 1 Port
MS17010 12Min 1 Port
Snmp 20Min 1 Port

PS: the scanning speed is actually similar to the speed of Ladon. Net version, but there is no special record, because the speed of go version is recorded by the way during the rewrite test

Cross platform / whole platform / whole system

Support old and new operating systems, especially old Linux systems. Many online tools can't be used at all or various errors are reported

TestOn

ID OS
0 WinXP
1 Win 2003
2 Win 7
3 Win 8.1
4 Win 10
5 Win 2008 R2
6 Win 2012 R2
7 Win 2019
8 Kali 1.0.2
9 Kali 2018
10 Kali 2019
11 SUSE 10
12 CentOS 5.8
13 CentOS 6.3
14 CentOS 6.8
15 Fedora 5
16 RedHat 5.7
17 BT5-R3
18 MacOS 10.15
19 Ubuntu 8
20 Ubuntu 18

MacOS x64 10.15

image

Linux

image

Windows

image

Download

LadonGo (ALL OS)

https://github.com/k8gege/LadonGo/releases
http://k8gege.org/Download/LadonGo.rar

Ladon (Windows & Cobalt Strike)

History: https://github.com/k8gege/Ladon/releases
911 Ver:http://k8gege.org/Download

Stargazers over time

Stargazers over time

About

Ladon for Kali 全平台开源内网渗透扫描器,Windows/Linux/Mac/路由器内网渗透,使用它可轻松一键批量探测C段、B段、A段存活主机、高危漏洞检测MS17010、SmbGhost,远程执行SSH/Winrm,密码爆破SMB/SSH/FTP/Mysql/Mssql/Oracle/Winrm/HttpBasic/Redis,端口扫描服务识别PortScan指纹识别/HttpBanner/HttpTitle/TcpBanner/Weblogic/Oxid多网卡主机,端口扫描服务识别PortScan。

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published