• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Jok3r v3 [ Network & Web Pentest Automation Framework ]

Status
Not open for further replies.

dEEpEst

☣☣ In The Depths ☣☣
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Mar 29, 2018
Messages
13,861
Solutions
4
Reputation
32
Reaction score
45,552
Points
1,813
Credits
55,350
‎7 Years of Service‎
 
56%
Jok3r v3



Network & Web Pentest Automation Framework





slide4.png










About


Overview



  
Jok3r is a framework that aids penetration testers for network infrastructure and web security assessments. Its goal is to automate as much stuff as possible in order to quickly identify and exploit "low-hanging fruits" and "quick win" vulnerabilities on most common TCP/UDP services and most common web technologies (servers, CMS, languages...).








 

Combine Pentest Tools


Do not re-invent the wheel. Combine the most useful hacking tools/scripts available out there from various sources, in an automatic way.





 

Automate Attacks


Automatically run security checks adapted to the targeted services. Reconnaissance, CVE lookup, vulnerability scanning, exploitation, bruteforce...





 

Centralize Mission Data


Store data related to targets in a local database. Keep track of all the results from security checks and continuously update the database.










Features


Key Features



  








Pentest Toolbox Management



 



 

Selection of Tools


Compilation of 50+ open-source tools & scripts, from various sources.



 

Docker-based


Application packaged in a Docker image running Kali OS, available on Docker Hub.



 

Ready-to-use


All tools and dependencies installed, just pull the Docker image and run a fresh container.



 

Updates made easy


Easily keep the whole toolbox up-to-date by running only one command.



 

Easy Customization


Easily add/remove tools from a simple configuration file.





feature-01.png






feature-02.png

feature-03.png






Network Infrastructure Security Assessment



 



 

Many supported Services


Target most common TCP/UDP services (HTTP, FTP, SSH, SMB, Oracle, MS-SQL, MySQL, PostgreSQL, VNC, etc.).



 

Combine Power of Tools


Each security check is performed by a tool from the toolbox. Attacks are performed by chaining security checks.



 

Context Awareness


Security checks to run are selected and adapted according to the context of the target (i.e. detected technologies, credentials, vulnerabilities, etc.).



 

Reconnaissance


Automatic fingerprinting (product detection) of targeted services is performed.



 

CVE Lookup


When product names and their versions are detected, a vulnerability lookup is performed on online CVE databases (using Vulners & CVE Details).



 

Vulnerability Scanning


Automatically check for common vulnerabilities and attempt to perform some exploitations (auto-pwn).



 

Brute-force Attack


Automatically check for default/common credentials on the service and perform dictionnary attack if necessary. Wordlists are optimized according to the targeted services.



 

Post-authentication Testing


Automatically perform some post-exploitation checks when valid credentials have been found.









Web Security Assessment



 



 

Large Focus on HTTP


More than 60 different security checks targeting HTTP supported for now.



 

Web Technologies Detection


Fingerprinting engine based on Wappalyzer is run prior to security checks, allowing to detect: Programming language, Framework, JS library, CMS, Web & Application Server.



 

Server Exploitation


Automatically scan and/or exploit most critical vulnerabilities (e.g. RCE) on web and application servers (e.g. JBoss, Tomcat, Weblogic, Websphere, Jenkins, etc.).



 

CMS Vulnerability Scanning


Automatically run vulnerability scanners on most common CMS (Wordpress, Drupal, Joomla, etc.).





feature-04.png






feature-05.png

feature-06.png






Local Database & Reporting



 



 

Local Database


Data related to targets is organized by missions (workspaces) into a local Sqlite database that is kept updated during security testings.



 

Metasploit-like Interactive Shell


Access the database through an interactive shell with several built-in commands.



 

Import Targets from Nmap


Add targets to a mission either manually or by loading Nmap results.



 

Access all Results


All outputs from security checks, detected credentials and vulnerabilities are stored into the database and can be accessed easily.



 

Reporting


Generate full HTML reports with targets summary, web screenshots and all results from security testing.











Architecture


Framework Architecture



  
General Architecture graph

jok3r-architecture.svg


Flowchart

jok3r-flow-chart.svg












Demo


Demonstration Videos



  









Download


Get Jok3r



  
Jok3r is open-source. Contributions, ideas and bug reports are welcome !
 

To see this hidden content, you must like this content.

 
Status
Not open for further replies.
Back
Top