BabySploit is an open source penetration testing toolkit written in Python. The toolkit supports the following penetration testing tools to perform penetration testing tasks, such as information gathering, exploitation, phishing, bruteforcing, and steganography related tasks.
Information Gathering Tools
Nmap can be used to find live hosts and open ports during penetration testing. Iplookup gathers host and geographical information about target IP/Domain. Dnslookup tool collects DNS related information. Censys is the search engine for the internet connected devices. Censyslookup tool can collect Censys api records. BabySploit supports Raccoon tool for information gathering tasks. Cfbypass can be used to bypass Cloudflare to find out the real IP addresses of target hosts. Cloudflare provides security to the websites by hiding their real IP addresses and filtering the incoming traffic.
Serachsploit is an open source tool used for finding PHP and OS based exploits, such as Window, Linux, and MAC OS exploits. Reverseshell can create payloads. Ftpvulnscan tool can assess buffer overflow vulnerability. Wpseku in BabySploit’s arsenal is a WordPress vulnerability scanner.
Currently, BabySploit supports only Blackeye phishing tool. Blackeye tool is capable of cloning all the major social media web pages for phishing.
Metakiller tool can be used to harvest the metadata of an image. Similarly, Pdfmeta can grab metadata for pdf format files.
FTP is a file transfer protocol based on client-server architecture that requires TCP network like internet to operate. The protocol is used to transfer files between hosts. The security is ensured through FTP credentials. FTpbruteforce tool can launch bruteforce attack against such FTP credentials.
BabySploit is a Linux based penetration testing toolkit. To install BabySplit in Linux OS, first we need to update/upgrade the OS packages using the following commands.
sudo apt-get update sudo apt-get upgrade
The prerequisites i-e exploitdb, netcat, nmap, perl, and php7.0 packages can be installed using the following command.
sudo apt-get install exploitdb netcat nmap perl php7.0
After installing the prerequisites, clone and install the toolkit using the following commands.
git clone https://github.com/M4cs/BabySploit.git
cd BabySploit python3 setup.py install
How BabySploit Works
The following command opens BabySploit’s commands menu in the terminal.
BabySploit comes with default configuration settings that can be viewed using info command. The default settings can be changed using the set command. The configurations can be restored by using the reset command mentioned in the commands menu.
In order to view all the available tools, type the tools command in the command line interface.
This displays all the available tools divided into different categories based on their functionality.
Any tool can be used by typing its name. For instance, we can launch Iplookup tool by typing its name in the terminal.
Type the IP address or Domain name to find out the IP based information about the target host. The results are displayed in the following format.
Similarly, we can type raccoon in the terminal to launch Raccoon tool for reconnaissance purpose.
The following command triggers Raccoon tool to perform reconnaissance tasks against the target host (for example: webscantest.com)
raccoon <target host>
Raccoon tool can grab useful data like server information, cookies information, flags status, and open ports information.
All the other tools supported by BabySploit can be launched in a similar way. The following screenshot shows list of templates supported by Blackeye for phishing purpose.
An overview of Windows based exploits from Serachsploit tool can be seen in the following screenshot.
BabySploit toolkit makes penetration testing easy by providing simple interface for some advanced level penetration testing tools like Raccoon and Blackeye.