Results 1 to 4 of 4

Thread: [FIX] Windows- Binary Tools

  1. #1
    Super Moderator Archangel-Amael's Avatar
    Join Date
    Jan 2010
    Location
    Somewhere
    Posts
    8,012

    Default [FIX] Windows- Binary Tools

    This thread addresses all of the tools under
    Code:
     #/pentest/windows-binaries/
    databases  kartoffel  misc  passwd-attack  pstools  scanners  sniffers  tools
    Since there are several tools here I did not get chance to test them all thoroughly. If you find something wrong please post here.
    The tools listed all require wine which is installed in bt4
    You can configure wine if need be under the K menu>wine>configure
    The default icon for all is "cache"
    Most of these tools are really old so they may not be useful, then again maybe so.


    kartoffel
    Kartoffel 32 bit setup and 64
    Command Field: wine setup32.exe; sudo -s
    command wine setup64.exe; sudo -s
    Name Field: Kartoffel 32 or 64
    Work Path:/pentest/windows-binaries/kartoffel/



    Hijetter
    Command Field:wine hijetter.exe; sudo -s
    Name Field: HiJetter
    Work Path: /pentest/windows-binaries/misc/


    SQLDict
    Command Field: sqldict.exe; sudo -s
    Name Field: SQLDict
    Work Path: /pentest/windows-binaries/misc/
    check run in termial box

    thc-orakelcrackert11g
    Command Field:wine thc-orakelcrackert11g.exe; sudo -s
    Name Field: thc-orakelcrackert11g
    Work Path: /pentest/windows-binaries/misc/
    check run in terminal box

    PWDump4.exe
    Command Field:wine PWDump.exe; sudo -s
    Name Field: PwDummp4
    Work Path: /pentest/windows-binaries/passwd-attack/
    Check "run in terminal" box

    SAMDUMP.EXE
    Command Field: wine SAMDUMP.EXE; sudo -s
    Name Field: SamDump
    Work Path: /pentest/windows-binaries/passwd-attack/
    Check "run in terminal " box

    /pentest/windows-binaries/databases/

    sqlexec20.exe
    For this trick to work you need to download the missing .dll
    MSVBVM60.dll
    You can get it from here
    http://www.dll-files.com/dllindex/dl...shtml?msvbvm60

    add this file to the directory

    Command Field: wine sqlexec20.exe ; sudo -s
    Name Field: SQL execute helper
    Work Path: /pentest/windows-binaries/databases/
    Check run in terminal

    pentest/windows-binaries/passwd-attack/
    Command Field: wine cachedump; sudo -s
    Name Field: CacheDump
    Work Path: /pentest/windows-binaries/passwd-attack/
    check run in terminal

    Command Field: wine fgdump.exe ; sudo -s
    Name Field: fgdump
    Work Path: /pentest/windows-binaries/passwd-attack/
    check run in terminal

    Command Field: wine FindPass.exe; sudo -s
    Name Field: FindPass
    Work Path: /pentest/windows-binaries/passwd-attack/
    check run in terminal

    Command Field: wine pulist.exe; sudo -s
    Name Field: pulist
    Work Path: /pentest/windows-binaries/passwd-attack/
    check run in terminal


    /pwdump6/

    Command Field: wine PwDump.exe; sudo -s
    Name Field: PwDump6
    Work Path:/pentest/windows-binaries/passwd-attack/pwdump6
    check run in terminal
    this is for 6 not 4

    /smbcrack2/

    Command Field: wine smbcrack.exe; sudo -s
    Name Field: SMBCrack2
    Work Path: /pentest/windows-binaries/passwd-attack/smbcrack2/
    check run in terminal

    /pstools/
    create a new subfolder called PSTools

    Command Field: wine psexec.exe; sudo -s
    Name Field: psexec
    Work Path: /pentest/windows-binaries/pstools/
    check run in terminal

    Command Field: wine psfile.exe; sudo -s
    Name Field: psfile
    Work Path: /pentest/windows-binaries/pstools/
    check run in terminal

    Command Field: wine psgetsid.exe; sudo -s
    Name Field: psgetsid
    Work Path: /pentest/windows-binaries/pstools/
    check run terminal

    Command Field: wine Psinfo.exe; sudo -s
    Name Field: psinfo
    Work Path:/pentest/windows-binaries/pstools/
    check run terminal

    Command Field: wine pskill.exe; sudo -s
    Name Field: pskill
    Work Path:/pentest/windows-binaries/pstools/
    check run terminal

    Command Field: wine pslist.exe; sudo - s
    Name Field: pslist
    Work Path:/pentest/windows-binaries/pstools/
    check run terminal

    Command Field: wine psloggedon.exe; sudo -s
    Name Field: psloggedon
    Work Path: /pentest/windows-binaries/pstools/
    check run terminal

    Command Field: wine psloglist.exe; sudo -s
    Name Field: psloglist
    Work Path: /pentest/windows-binaries/pstools/
    check run terminal

    Command Field: wine pspasswd.exe; sudo -s
    Name Field: pspasswd
    Work Path: /pentest/windows-binaries/pstools/
    check run terminal

    Command Field: wine psservice.exe; sudo -s
    Name Field: psservice
    Work Path: /pentest/windows-binaries/pstools/
    check run terminal

    Command Field: wine psshutdown.exe; sudo -s
    Name Field: psshutdown
    Work Path: /pentest/windows-binaries/pstools/
    check run terminal

    Command Field: wine pssuspend.exe; sudo -s
    Name Field: pssuspend
    Work Path: /pentest/windows-binaries/pstools/
    check run terminal

    Command Field: wine pstoreview.exe; sudo -s
    Name Field: pstoreview
    Work Path: /pentest/windows-binaries/pstools/

    make a new directory called scanners

    Command Field: wine dfind.exe; sudo -s
    Name Field: dfind
    Work Path:/pentest/windows-binaries/scanners/
    check run terminal

    Command Field: wine gdiscan.exe; sudo -s
    Name Field: gdiscan
    Work Path: /pentest/windows-binaries/scanners/
    check run in terminal

    Command Field: wine gdiscan_gui.exe; sudo -s
    Name Field: gdiscan gui
    Work Path: /pentest/windows-binaries/scanners/
    check run in terminal

    Command Field: wine hs_wins.exe; sudo -s
    Name Field: hs_wins
    Work Path:/pentest/windows-binaries/scanners/
    check run in terminal

    Command Field: wine sl.exe; sudo -s
    Name Field: sl
    Work Path: /pentest/windows-binaries/scanners/
    check run in terminal


    create a new subfolder called sniffers

    Command Field: wine enyemon10; sudo -s
    Name Field: enyemon10
    Work Path:/pentest/windows-binaries/sniffers/


    Command Field: wine ngrep.exe; sudo -s
    Name Field: ngrep
    Work Path: /pentest/windows-binaries/sniffers/
    check run in terminal

    Command Field: wine rawsniffer.exe; sudo -s
    Name Field: rawsniffer
    Work Path: /pentest/windows-binaries/sniffers/
    check run in terminal

    /tools/
    create a new subofolder called tools
    Command Field: wine Fport.exe; sudo -s
    Name Field: Fport
    Work Path: /pentest/windows-binaries/tools/
    check run in terminal

    Command Field: wine klogger.exe; sudo -s
    Name Field: Klogger
    Work Path: /pentest/windows-binaries/tools/
    check run in terminal

    Command Field: wine mbenum.exe; sudo -s
    Name Field: mbenum
    Work Path: /pentest/windows-binaries/tools/
    check run in terminal

    Command Field: wine mstsc.exe; sudo -s
    Name Field: mstsc
    Work Path: /pentest/windows-binaries/tools/
    check run in terminal

    Command Field: wine nbtenum.exe; sudo -s
    Name Field: nbtenum
    Work Path: /pentest/windows-binaries/tools/
    check run in terminal

    Command Field: wine nc.exe; sudo -s
    Name Field: nc
    Work Path: /pentest/windows-binaries/tools/
    check run in terminal

    Command Field: wine plink.exe; sudo -s
    Name Field: Putty
    Work Path: /pentest/windows-binaries/tools/
    Check run in terminal

    Command Field: wine radmin.exe; sudo -s
    Name Field: radmin
    Work Path: /pentest/windows-binaries/tools/

    Command Field: wine regdmp.exe; sudo -s
    Name Field: regdmp
    Work Path: /pentest/windows-binaries/tools/
    check run in terminal

    Command Field: wine sbd.exe; sudo -s
    Name Field: sbd
    Work Path: /pentest/windows-binaries/tools/
    check run in terminal

    Command Field: wine tftpd32.exe; sudo -s
    Name Field: tftpd
    Work Path: /pentest/windows-binaries/tools/
    check run in terminal

    Command Field: wine wget.exe; sudo -s
    Name Field: Wget
    Work Path: /pentest/windows-binaries/tools/
    check run in terminal

    Command Field: wine whoami.exe; sudo -s
    Name Field: whoami
    Work Path: /pentest/windows-binaries/tools/
    check run in terminal

    create a new sub folder called enumplus

    Command Field: wine enum.exe; sudo -s
    Name Field: enum
    Work Path: /pentest/windows-binaries/tools/enumplus/
    check run in terminal
    To be successful here you should read all of the following.
    ForumRules
    ForumFAQ
    If you are new to Back|Track
    Back|Track Wiki
    Failure to do so will probably get your threads deleted or worse.

  2. #2

    Default

    you know that some of this tools are for uploading to a target host line nc.exe, pulist, fgdump ... among others, but nice work either way on the ones that need to be in the menu.

  3. #3
    Senior Member secure_it's Avatar
    Join Date
    Feb 2010
    Location
    在這兩者之間 BackTrack是4 FwdTrack4
    Posts
    854

    Default

    I thought same that there is no need to put these entries into menus.as these uses to put after exploiting target.

  4. #4
    Super Moderator Archangel-Amael's Avatar
    Join Date
    Jan 2010
    Location
    Somewhere
    Posts
    8,012

    Default

    yeah I know, that's why I stated at the beginning that I did not go through all of them just seen that they were there and made a simple menu fix for them.
    Actually it was merely cut and paste type work that took about 20 minutes or so to do. I didn't make a menu link for myself for them.
    To be successful here you should read all of the following.
    ForumRules
    ForumFAQ
    If you are new to Back|Track
    Back|Track Wiki
    Failure to do so will probably get your threads deleted or worse.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •