keimpx
Description of the keimpx package
keimpx is an open source tool, released under a modified version of Apache License 1.1.
It can be used to quickly check for valid credentials across a network over SMB. Credentials can be:
- Combination of user / plain-text password.
- Combination of user / NTLM hash.
- Combination of user / NTLM logon session token.
If any valid credentials has been discovered across the network after its attack phase, the user is asked to choose which host to connect to and which valid credentials to use, then he will be prompted with an interactive SMB shell where the user can:
- Spawn an interactive command prompt.
- Navigate through the remote SMB shares: list, upload, download files, create, remove files, etc.
- Deploy and undeploy his own service, for instance, a backdoor listening on a TCP port for incoming connections.
- List users details, domains and password policy.
Tools included in the keimpx package
keimpx – Check for valid credentials across a network over SMB
root@kali:~# keimpx -h
keimpx 0.3-dev
by Bernardo Damele A. G. <bernardo.damele@gmail.com>
Usage: ./keimpx.py [options]
Options:
--version show program's version number and exit
-h, --help show this help message and exit
-v VERBOSE Verbosity level: 0-2 (default: 0)
-t TARGET Target address
-l LIST File with list of targets
-U USER User
-P PASSWORD Password
--nt=NTHASH NT hash
--lm=LMHASH LM hash
-c CREDSFILE File with list of credentials
-D DOMAIN Domain
-d DOMAINSFILE File with list of domains
-p PORT SMB port: 139 or 445 (default: 445)
-n NAME Local hostname
-T THREADS Maximum simultaneous connections (default: 10)
-b Batch mode: do not ask to get an interactive SMB shell
-x EXECUTELIST Execute a list of commands against all hosts
keimpx 0.3-dev
by Bernardo Damele A. G. <bernardo.damele@gmail.com>
Usage: ./keimpx.py [options]
Options:
--version show program's version number and exit
-h, --help show this help message and exit
-v VERBOSE Verbosity level: 0-2 (default: 0)
-t TARGET Target address
-l LIST File with list of targets
-U USER User
-P PASSWORD Password
--nt=NTHASH NT hash
--lm=LMHASH LM hash
-c CREDSFILE File with list of credentials
-D DOMAIN Domain
-d DOMAINSFILE File with list of domains
-p PORT SMB port: 139 or 445 (default: 445)
-n NAME Local hostname
-T THREADS Maximum simultaneous connections (default: 10)
-b Batch mode: do not ask to get an interactive SMB shell
-x EXECUTELIST Execute a list of commands against all hosts
keimpx Usage Example
Read a list of IP addresses (-l /root/smbopen.txt) and attempt to login as the user victim (-U victim) with a password of s3cr3t (-P s3cr3t) with a verbosity level of 1 (-v 1), running in batch mode (-b):
root@kali:~# keimpx -l /root/smbopen.txt -U victim -P s3cr3t -v 1 -b
keimpx 0.3-dev
by Bernardo Damele A. G. <bernardo.damele@gmail.com>
[09:26:59] [INFO] Loading targets
[09:26:59] [INFO] Loading credentials
[09:26:59] [INFO] Loading domains
[09:26:59] [INFO] Loaded 4 unique targets
[09:26:59] [INFO] Loaded 1 unique credentials
[09:26:59] [INFO] No domains specified, using NULL domain
[09:26:59] [INFO] Attacking host 192.168.1.104:445
[09:26:59] [INFO] Attacking host 192.168.1.200:445
[09:26:59] [INFO] Attacking host 192.168.1.220:445
[09:26:59] [INFO] Attacking host 192.168.1.232:445
[09:26:59] [INFO] Wrong credentials on 192.168.1.104:445: victim/s3cr3t (ERRnoaccess(Access denied.))
[09:26:59] [INFO] Attack on host 192.168.1.104:445 finished
[09:26:59] [INFO] Valid credentials on 192.168.1.200:445: victim/s3cr3t
keimpx 0.3-dev
by Bernardo Damele A. G. <bernardo.damele@gmail.com>
[09:26:59] [INFO] Loading targets
[09:26:59] [INFO] Loading credentials
[09:26:59] [INFO] Loading domains
[09:26:59] [INFO] Loaded 4 unique targets
[09:26:59] [INFO] Loaded 1 unique credentials
[09:26:59] [INFO] No domains specified, using NULL domain
[09:26:59] [INFO] Attacking host 192.168.1.104:445
[09:26:59] [INFO] Attacking host 192.168.1.200:445
[09:26:59] [INFO] Attacking host 192.168.1.220:445
[09:26:59] [INFO] Attacking host 192.168.1.232:445
[09:26:59] [INFO] Wrong credentials on 192.168.1.104:445: victim/s3cr3t (ERRnoaccess(Access denied.))
[09:26:59] [INFO] Attack on host 192.168.1.104:445 finished
[09:26:59] [INFO] Valid credentials on 192.168.1.200:445: victim/s3cr3t
No comments