WarberryPi v2.0 Tactical Exploitation

The WarBerry was built with one goal in mind; to be used in red teaming engagement where we want to obtain as much information as possible in a short period of time with being as stealth as possible. Just find a network port and plug it in.
The scripts have been designed in a way that the approach is targeted to avoid noise in the network that could lead to detection and to be as efficient as possible. The WarBerry script is a collection of scanning tools put together to provide that functionality.
Changelog v2.0
- Added support for VOIP, rlogin, openvpn and IPSec scanning
- Added nearby Bluetooth devices scan
- Added optparse installation in README
- Changed menu to use optparse
- Added support for granular attacking
- -r –recon : This attack mode will only run the recon modules without performing any port scans
- -i –interface : Manually specify the interface to use. Default is eth0
- -H –hostname : Set this flag to disable changing the WarBerry’s hostname during bypass modes
- -p –packets : Manually set the number of packets to capture. Default is 20 packets
- -e –enumeration : Set this flag to disable the enumeration scripts
- Added bootstrap script for automatic installation of dependencies
- Updated man pages
- No need to pass the attack type now. Default is -A –attack
- Enumeration flag is under bug testing
Usage
python warberry.py -h
Options:
- –version show program’s version number and exit
- -h, –help show this help message and exit
- -a ATTACKTYPE, –attack=ATTACKTYPE Attack Mode. Default: –attack
- -p PACKETS, –packets=PACKETS Number of Network Packets to capture
- -I IFACE, –interface=IFACE Network Interface to use. Default: eth0
- -i INTENSITY, –intensity=INTENSITY Port scan intensity. Default: T4
- -P, –poison Turn Poisoning on/off. Default: On
- -H, –hostname Change WarBerry hostname Default: Off
- -e, –enumeration Turn enumeration mode on/off. Default: On
- -r, –recon Recon only mode. No port scans
- -S, –sniffer Sniffer only mode.
- -C, –clear Clear previous output folders in ../Results
- -m, –man Print WarBerry man pages
example usage:
sudo python warberry.py -A
sudo python warberry.py –attack
sudo python warberry.py -r
[button size=large style=round color=red align=none url=Download WarberryPi v2.0]Download WarberryPi v2.0[/button]
Thanks to Yiannis Ioannides, for sharing this tool with us.