Kullanıcı1233
Kıdemli Üye
- 19 Tem 2011
- 4,371
- 12
Today, with the increase of WI-FI points, the number of people connected to the same network can reach very high figures. The higher the number of people, the lower the security rate, and the more difficult it is to make the network secure. Pythem, the multi-purpose penetration test tool I'm introducing to you today.
Pythem; It is written in Python and includes a medium-man attack, brute force attack, DNS fraud and many attack features. This tool has been developed for use by safety experts.
Pythem GitHub Link;
https://github.com/m4n3dw0lf/pythem
Installation;
Let's get our vehicle down to our system first.
Code
git clone https://github.com/m4n3dw0lf/pythem
When our download is complete, we are moving on to our setup process.
Code:
install the python setup.py
Usage;
We're running our vehicle.
Code:
pythem
First, when you type the help command, it sorts you out what you can do in programs and commands.
Today we're going to sample the SSH brute force attack.
First of all, with netdiscover, we learn the IP address of our target.
Once we know the target IP address, we enter our commands to launch our SSH brute force attack.
Code:
set file <wordlist******** veadi>
Code:
set target <targetIPaddress>
brute ssh
and we have reached the end of the introduction of a vehicle. You're going to be at peace.
Pythem; It is written in Python and includes a medium-man attack, brute force attack, DNS fraud and many attack features. This tool has been developed for use by safety experts.
Pythem GitHub Link;
https://github.com/m4n3dw0lf/pythem
Installation;
Let's get our vehicle down to our system first.
Code
git clone https://github.com/m4n3dw0lf/pythem
When our download is complete, we are moving on to our setup process.
Code:
install the python setup.py
Usage;
We're running our vehicle.
Code:
pythem
First, when you type the help command, it sorts you out what you can do in programs and commands.
Today we're going to sample the SSH brute force attack.
First of all, with netdiscover, we learn the IP address of our target.
Once we know the target IP address, we enter our commands to launch our SSH brute force attack.
Code:
set file <wordlist******** veadi>
Code:
set target <targetIPaddress>
brute ssh
and we have reached the end of the introduction of a vehicle. You're going to be at peace.
Translator : megat
https://www.turkhackteam.org/network/1803499-pythem-pentest-araci-kurulumu-ve-tanitimi-qwx.html