Pentest Achieve Knowledge Unite Rapid Interface - Python
PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication server). PAKURI-THON can perform most of the operations with intuitive web operations and commands to chatbots.
I've consulted many pentesting tools. I then took the good points of those tools and incorporated them into my own tools. In Japanese slang, imitation is also called "paku-ru".
ぱくる (godan conjugation, hiragana and katakana パクる, rōmaji pakuru)
- eat with a wide open mouth
- steal when one isn't looking, snatch, swipe
- copy someone's idea or design
- nab, be caught by the police
PAKURI-THON is an upgraded version of PAKURI that was presented at the 2020 Blackhat Asia Arsenal.
After the COVID-19 pandemic, the way we work has changed drastically and working remotely from home instead of going to the office has become the norm. This change in the way we work has increased security risks, raised awareness of security and increased the demand for pen testing.
However, there is still a shortage of security personnel in Japan. As the workload increases while the manpower does not, pen-testing becomes a monotonous and boring job, lowering the quality.
So, if we automate the boring and simple work, the machine will do the same work over and over again with accuracy, but is that really enough? Pen testing tools are also becoming more and more automated, but is that really enough?
I don't think so. I don't want to let machines take all the fun out of my life. But I don't like boring work. So I decided to enjoy boring work together with machines. The answer is PAKURI-THON.
PAKURI-THON was rebuilt in Python to improve the usability of PAKURI. As a result, it implements a web interface, making it much more intuitive and stylish than before.
Specifically, once PAKURI-THON is connected to the target network, it can be operated from a smartphone or tablet.
You can also use chat to share information with your team. Also, most operations can be solved by giving instructions to the bot. Therefore, there is no need to switch the method of information sharing when working with a team.
Best of all, wouldn't it be cool to be able to do a pen test just by talking to the machine using your smartphone, just like the hacker in the movie?
- The web interface is implemented so that it can be operated intuitively on smartphones and tablets. We were able to fit all of the pentests into the palm of our hand.
- Since we have a terminal in the web interface, you can operate the Kali Linux terminal directly from your smartphone or tablet. If you are using a tablet, you can hold it horizontally to enable some keyboard operations.
- The use of chatbots. Just talk to the chatbot (give instructions) and it will execute the command, which increases convenience as there is no need to switch the means of information sharing within the team.
- PowerShell Empire, which is used in actual cyber attacks, can be controlled through a web interface and can easily be used for red team training.
A raspberry pi4 with PAKURI-THON installed is connected to an air-gapped target system and concealed. The Attackers (Red Team) can connect to the PAKURI-THON wireless LAN and attack beyond the air gap of the target system. In this case, if the Attackers (Red Team) had entered the air gap as usual and continued the attack, the guard would have been called immediately as an obvious suspicious act. However, if PAKURI-THON is used, it will look like a smartphone or tablet being operated, and the cyber-attack will not be explicitly exposed until later.
Would you have an antenna attached to your laptop when launching an Evil Twin Attack or other MITM attack? Obviously, the appearance would be suspicious and would attract the attention of many people. With PAKURI-THON, however, once the mobile battery and antenna are connected to the raspberry pi4, there is no problem if you pack it directly into your backpack. Since operation can be done with a smartphone or tablet, no one will be suspicious of its appearance. And the Attackers (Red Team) can efficiently gather information on the target.
CAUTION |
---|
If you are interested, please use them in an environment under your control and at your own risk. And, if you execute the PAKURI-THON on systems that are not under your control, it may be considered an attack and you may have legally liabillity for your action. |
There are several means of installation. For manual installation, please refer to the PAKURI-THON wiki.
If you want to use the installer, please run the following command. You'll need root privileges to run it!
sudo ./install.sh
After the installation is complete, run the following command. You'll need root privileges to run it!
sudo ./pkr3.sh
___ ___ __ ____ _____ ____ ________ ______ _ __
/ _ \/ _ | / //_/ / / / _ \/ _/__/_ __/ // / __ \/ |/ /
/ ___/ __ |/ ,< / /_/ / , _// //___// / / _ / /_/ / /
/_/ /_/ |_/_/|_|\____/_/|_/___/ /_/ /_//_/\____/_/|_/
Tue Jan 25 08:24:53 AM EST 2022
Running system check...
Checking for root access... OK
Checking docker startup... OK
Checking for postgres...OK
Checking for SSH Service...OK
Checking for WebSSH...OK
Booting up PAKURI-THON... >>>>>>>>>>>>>>>>> done!
By default, PAKURI-THON is wating for you on port 5555, so please access it with a web browser.
The following ports are used by PAKURI-THON.
Application | Port |
---|---|
PAKURI-THON | 5555 |
PostgreSQL | 15432 |
WebSSH | 8888 |
PowerShell Empire | 1337, 8088 |
Mattermost | 8065 |
It is designed to be operable on smart phone and tablets. The honeycomb struture menu at the bottom right is a shortcut menu for one-handed operation. (Press the bottom right button to expand the menu as shown in the image. Normally, it is hidden.)
When a scan is performed and a host is found, an icon will be displayed. Click on the icon to display detailed information about the host.
You can use Nmap and Nikto for reconnaissance activities. You can also use the terminal if you want to command other Kali tools.
You can operate PowerShell Empire, create Stagers, and manage Agents.
By using WebSSH, you can operate the terminal console of PAKURI-THON directly on your web browser.
You can use Mattermost as a Slack-like chat tool to facilitate communication within your team. You can execute various commands simply by commanding the bot in the chat.
The chat tool mechanism can also be easily applied to Slack
If you use a smart phone, you can use the Mattermost application.
- OS: KAli Linux 2021.4a
- Memory: 8.0GB
- Browser:
- Firefox: 96.0
- Google Chrome: 97.0
- Chromium: 97.0
- Brave: 1.34.81
- This is intended for use Kali Linux. Operation on other OS is not guaranteed.
If you have some new idea about this project, issue, feedback or found some valuable tool feel free to open an issue for just DM me via @Mr.Rabbit or @PAKURI.