CYBER TOOLBOX v3.0|OPERATIONAL
8 TOOLS|THREAT: 4.2/10
Available Tools
guest@cyber-toolbox ~ network-scanner

$ ./network-scanner --target 10.0.0.0/24

[*] Scanning 256 hosts...

[+] 10.0.0.1 gateway 5 ports open

[+] 10.0.0.10 web-server 3 ports open

[+] 10.0.0.42 database 2 ports open

[+] 10.0.0.77 dev-box 4 ports open

[*] OS fingerprint: Linux 5.15 (3 hosts)

[*] Scan complete: 4 hosts found in 2.1s

guest@cyber-toolbox:~$
Pentest WorkflowRecon
1
Recon
dns-lookup → subdomain-enum
4 subdomains
2
Scan
network-scanner → port-analyzer
6 ports / 4 hosts
3
Analyze
vuln-assessor → header-inspector → ssl-checker
2 CVEs, 3/5 hdrs
4
Exploit
hash-cracker
md5 cracked 0.3s
Security Scorecard
NetworkWeb AppSSL/TLSDNSHeadersAuth
Threat Assessment
Network
SECURE
Web App
MODERATE
SSL/TLS
SECURE
DNS
MODERATE
Headers
CRITICAL
Passwords
MODERATE
Threat Level4.2/10
CVE Vulnerability Log

[CRITICAL] CVE-2024-1234nginx 1.24 remote code execution (CVSS: 9.8)

[CRITICAL] CVE-2024-2081Log4Shell variant in logging framework (CVSS: 10)

[HIGH] CVE-2024-3390kernel privilege escalation via eBPF (CVSS: 8.4)

[MEDIUM] CVE-2024-5678OpenSSH 8.9 privilege escalation (CVSS: 6.1)

[MEDIUM] CVE-2024-6012PostgreSQL SQL injection in json_path (CVSS: 5.9)

[MEDIUM] CVE-2024-7744Node.js HTTP request smuggling (CVSS: 5.3)

[LOW] CVE-2024-8001curl verbose mode info disclosure (CVSS: 3.7)

[LOW] CVE-2024-8899OpenSSL timing side-channel leak (CVSS: 2.6)

[LOW] CVE-2024-9100redis ACL bypass in debug mode (CVSS: 3.1)

[CRITICAL] CVE-2024-0042glibc buffer overflow in DNS resolver (CVSS: 9.1)

Scan History Timeline
Mar 24Full Scan12 findings
Mar 20Port Scan3 findings
Mar 15Vuln Assessment8 findings
Mar 10Header Check2 findings
Mar 5SSL Audit0 findings
Feb 28Network Scan5 findings
Live Packet Capture · eth0● capturing
#TimeSourceDestinationProtocolLenInfo
100.00010.0.0.4210.0.0.1DNS78A api.target.com
200.41010.0.0.110.0.0.42DNS9493.184.216.34
300.82010.0.0.4293.184.216.34TCP7449214 → 443 [SYN]
401.23093.184.216.3410.0.0.42TCP74443 → 49214 [SYN, ACK]
501.64010.0.0.4293.184.216.34TLS583Client Hello (SNI)
602.05093.184.216.3410.0.0.42TLS1494Server Hello, Cert
702.46010.0.0.4293.184.216.34HTTPS412GET /api/v1/items
802.87093.184.216.3410.0.0.42HTTPS1872200 OK · 1.6 KB JSON
903.28010.0.0.4210.0.0.10SSH116Encrypted (AES256)
1003.69010.0.0.1010.0.0.42SSH84Encrypted (AES256)
1104.10010.0.0.42224.0.0.251UDP165mDNS query · _http._tcp
1204.51010.0.0.428.8.8.8ICMP98Echo request · seq 14
1304.9208.8.8.810.0.0.42ICMP98Echo reply · 12.4ms
1405.330ff:ff:ff:ff10.0.0.0/24ARP42Who has 10.0.0.77?
14 packets shown5284 bytes captured0 dropped
Attack SimulationRUNNING...

Next Project

Image Gallery