-
Notifications
You must be signed in to change notification settings - Fork 2
/
Copy pathteamsploit.conf
146 lines (122 loc) · 5.17 KB
/
teamsploit.conf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
#!/bin/bash
#
# TeamSploit - Pen Testing With Friends
# Copyrighted: Justin M. Wray (wray.justin@gmail.com)
# Special Thanks: Ben Heise (Twitter:@benheise) Team ICF (Twitter:@ICFRedTeam)
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
# Change this to a '1' (no qoutes) when you finish editing this file...
TS_CONFIG=0
# TeamSploit GUI - CURRENTLY IN ALPHA (Unstable) (1=GUI, 0=CLI)
TS_GUI=1
# Skip GUI Configuration Wizard?
TS_SKIP_CONFIG_WIZ=0
# How many "primary" windows do you want? Some people want more than one...
TS_WINDOWS=1
# Which interface are you using?
TS_MY_INT=eth0
# Local? Likely not right? This is a team effort afterall...(0=Team DB, 1=Local DB)
TS_LOCAL=0
# Otherwise...Database! (FTW)
TS_DB_NAME=teamsploitdb
TS_DB_HOST=192.168.1.100
TS_DB_PORT=5432
TS_DB_USER=teamsploit
TS_DB_PASS=password
# Woulc you like to connect to a MSFD Service?
TS_MSFD_CONNECT=1
TS_MSFD_HOST=192.168.1.100
TS_MSFD_PORT=51337
# We are going to pass shells...make sure they are ready...1025 is the default
TS_SHARE_SHELLS=1 # If you are not sharing shells or have no team (solo run), you'll still get your shell.
TS_TEAM_MATES="192.168.1.101;192.168.1.102;192.168.1.103;193.168.1.104;192.168.1.105"
TS_TEAM_PORT=1025
TS_TEAM_PORT_2=7000
TS_TEAM_PORT_HTTP=80
TS_TEAM_PORT_HTTPS=443
TS_TEAM_PORT_DNS=53
# Targets Teams?
TS_TARGET_SOLO=0 # Only one target range? Don't want to automatically target the below line? Set this to one (1).
TS_TARGET_RANGES="192.168.21;192.168.22;192.168.22;192.168.23;192.168.24;192.168.25;192.168.26;192.168.27;192.168.28"
# Adding a user account? Cool.
TS_ADMIN_USER=user
TS_ADMIN_PASS=password
# TrollWare - (1=yes, 0=no)
TS_TROLLWARE=0
TS_NETSTOPPER=0
TS_UNPATCHER=0
# Nessus Connect?
TS_NESSUS_CONNECT=0
TS_NESSUS_AUTOSCAN=0
TS_NESSUS_POLICY=-1
TS_NESSUS_HOST=127.0.0.1
TS_NESSUS_PORT=8834
TS_NESSUS_USER=nessus
TS_NESSUS_PASS=password
# Nexpose Connect?
TS_NEXPOSE_CONNECT=0
TS_NEXPOSE_AUTOSCAN=0
TS_NEXPOSE_HOST=127.0.0.1
TS_NEXPOSE_PORT=5432
TS_NEXPOSE_USER=nexpose
TS_NEXPOSE_PASS=password
# OpenVAS Connect?
TS_OPENVAS_CONNECT=0
TS_OPENVAS_AUTOSCAN=0
TS_OPENVAS_HOST=127.0.0.1
TS_OPENVAS_PORT=9390
TS_OPENVAS_USER=openvas
TS_OPENVAS_PASS=password
# Fully Automated Owning (MAKE SURE YOU HAVE A VULN SCANNER SETUP AND ENABLED)
TS_AUTO_OWN=0
TS_AUTO_OWN_JOBS=10
# IRC Settings - Used in TeamSploit GUI (Chat)
TS_IRC=0 # Connect To IRC? 1=yes, 0=no
TS_IRC_NICK=TeamSploit # Nickname/Handle to use on chat
TS_IRC_SERVER=chat.freenode.org # Server IP or FQDN
TS_IRC_PORT=6667 # Port IRC is running on (make sure you use the SSL port if you are using SSL)
TS_IRC_CHANNEL=teamsploit # Channel you'll join (dont include the pound sign)
TS_IRC_SSL=0 # SSL Enabled? 1=yes, 0=no
# SploitWatch - Player Tracking and Reporting - Sends Exploitation/Activity Information to Centralized Server
TS_SPLOITWATCH=0 # Load, 1=yes, 0=no
TS_SPLOITWATCH_HANDLE=Unknown # Attacker Handle - Used to keep track of individual attackers
TS_SPLOITWATCH_EVENT=Unknown # Event ID - Used to keep track of separate events/engagements
TS_SPLOITWATCH_SRV_URI=http://192.168.1.100/sploitwatcher.php # URI to the SploitWatch receiving end
TS_SPLOITWATCH_CMD_REPORT=true # true or false - do you want to send all commands being executed (within Metasploit and sessions)
# Trojans - Right now, just Linux...(1=yes, 0=no)
TS_TROJAN=0
TS_TROJAN_PATH=/etc/fonts/admin/.proc
TS_TROJAN_PASSWORD=toor # Password used for installation
TS_TROJAN_LOADER=sysdev # This is just a name, and in reality, no one should see it...
TS_TROJAN_STARTUP=ksysinit # This is just a name, and in reality, no one should see it...
TS_TROJAN_PERSIST=klogmod # This is also a name, and depending on your hidden keyword, they may see it...
TS_TROJAN_HIDE=admin
TS_TROJAN_ACCOUNT=admin
TS_TROJAN_PASSWD="admin:x:0:0:Support Account (DO NOT EDIT):/:/bin/bash"
TS_TROJAN_SSHKEY=PUT_YOUR_SSH_PUT_KEY_HERE
TS_TROJAN_RE_PORT=8888
# Autopost Output? Show it or Surpress it (true == show, false == surpress) - it is in the output (loot directory) file eitherway...
TS_AUTOPOST_OUTPUT=false
# Loot Dir?
TS_LOOT_DIR=./loot/
# Would you like to run a MSFD/MSFRPCD Service?
TS_SERVER=0
TS_SERVER_MSFD_PORT=51337
TS_SERVER_MSFRPCD_PORT=51338
TS_SERVER_MSFRPCD_USER=teamsploit
TS_SERVER_MSFRPCD_PASS=teamsploit
# You likely want to leave the IP part alone - If this line is failing, you can manually set YOUR IP
TS_MY_IP=`ifconfig | grep "$TS_MY_INT" -A 1 | tail -n1 | awk {' print $2 '} | sed -e 's/addr://g'`
# Don't touch this... >.< (If you really know what you are doing, specify the PATH here)
TS_MSF_PATH=`./.msfpath`