{"id":722,"date":"2020-02-22T09:45:00","date_gmt":"2020-02-22T09:45:00","guid":{"rendered":"http:\/\/zerothcode.com\/blog\/?p=722"},"modified":"2020-02-22T10:34:35","modified_gmt":"2020-02-22T10:34:35","slug":"penta-automate-pentesting","status":"publish","type":"post","link":"https:\/\/zerothcode.com\/blog\/penta-automate-pentesting\/","title":{"rendered":"Penta- Open Source All-in-one CLI To Automate Pentesting"},"content":{"rendered":"<div id=\"aim12133320827592958883\">\n<div dir=\"ltr\">\n<p>Penta<\/p>\n<h2>Penta\u00a0(PENTest + Automation tool) is Pentest automation tool using Python3.<\/h2>\n<h3>Installation Penta<\/h3>\n<p><b>Install requirements<\/b><br \/>\npenta requires the following packages.<\/p>\n<ul>\n<li>Python3.7<\/li>\n<li>pipenv<\/li>\n<\/ul>\n<p>Resolve python package dependency.<\/p>\n<p>$ pipenv install<\/p>\n<p>If you dislike pipenv..<\/p>\n<p>$ pip install -r requirements.txt<\/p>\n<h3>Usage<\/h3>\n<p>$ pipenv run start &lt;options&gt;<\/p>\n<p>If you dislike pipenv&#8230;<\/p>\n<p>$ python penta\/penta.py<\/p>\n<p><b>Usage: List options<\/b><\/p>\n<p>$ pipenv run start -h<\/p>\n<p>usage: penta.py [-h] [-target TARGET] [-ports PORTS] [-proxy PROXY]<\/p>\n<p>Penta is Pentest automation tool<\/p>\n<p><b>optional arguments:<\/b><\/p>\n<ul>\n<li>\u00a0 -h, &#8211;help\u00a0 \u00a0 \u00a0 show this help message and exit<\/li>\n<li>\u00a0 -target TARGET\u00a0 Specify target IP \/ domain<\/li>\n<li>\u00a0 -ports PORTS\u00a0 \u00a0 Please, specify the target port(s) separated by comma.<\/li>\n<li>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Default: 21,22,25,80,110,443,8080<\/li>\n<li>\u00a0 -proxy PROXY\u00a0 \u00a0 Proxy[IP:PORT]<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div>\n<article id=\"2133320827592958883\" class=\"post isobrick hentry\">\n<div id=\"post-body-2133320827592958883\" class=\"post-body entry-content\">\n<div id=\"aim22133320827592958883\">\n<p><b>Usage: Main menu<\/b><\/p>\n<p>[ ] === MENU LIST =================================<br \/>\n[0] EXIT<br \/>\n[1] Port scanning Default: 21,22,25,80,110,443,8080<br \/>\n[2] Nmap &amp; vuln scanning<br \/>\n[3] Check HTTP option methods<br \/>\n[4] Grab DNS server info<br \/>\n[5] Shodan host search<br \/>\n[6] FTP connect with anonymous<br \/>\n[7] SSH connect with Brute Force<br \/>\n[99] Change target host<\/p>\n<p><b>1. Port scanning<\/b><br \/>\nTo check ports for a target. Log output supported.<\/p>\n<p><b>2. Nmap<\/b><br \/>\nTo check ports by additional means using nmap<\/p>\n<p><b>3. Check HTTP option methods<\/b><br \/>\nTo check the methods (e.g. GET,POST) for a target.<\/p>\n<p><b>4. Grab DNS server info<\/b><br \/>\nTo show the info about DNS server.<\/p>\n<p>Shodan host search To collect host service info from Shodan.<br \/>\nRequest\u00a0<a href=\"https:\/\/developer.shodan.io\/\" target=\"_blank\" rel=\"noopener noreferrer\">Shodan API key<\/a>\u00a0to enable the feature.<\/p>\n<p>FTP connect with anonymous To check if it has anonymous access activated in port 21. FTP users can authenticate themselves using the plain text sign-in protocol (Typically username and password format), but they can connect anonymously if the server is configured to allow it.<\/p>\n<p>Anyone can log in to the server if the administrator has allowed an FTP connection with anonymous login.<\/p>\n<p>SSH connect with Brute Force To check ssh connection to scan with Brute Force. Dictionary data is in\u00a0data\/dict.<\/p>\n<\/div>\n<div>\n<p>SSH connect with Brute Force To check ssh connection to scan with Brute Force. Dictionary data is in\u00a0data\/dict.<\/p>\n<p><a href=\"https:\/\/github.com\/takuzoo3868\/penta\" target=\"_blank\" rel=\"noopener noreferrer\">Download Now<\/a><\/p>\n<\/div>\n<div><\/div>\n<\/div>\n<\/article>\n<div>Chekout Our New Blog\u00a0 : <a href=\"http:\/\/zerothcode.com\/blog\/spam-whatsapp\/\">spam-whatsapp<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Penta Penta\u00a0(PENTest + Automation tool) is Pentest automation tool using Python3. Installation Penta Install requirements penta requires the following packages.<\/p>\n","protected":false},"author":1,"featured_media":723,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[51],"tags":[],"yst_prominent_words":[764,771,767,758,753,769,766,757,770,772,768,755,754,759,737,738,774,756,752,773],"class_list":["post-722","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tutorials"],"_links":{"self":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/comments?post=722"}],"version-history":[{"count":0,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/722\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media\/723"}],"wp:attachment":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media?parent=722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/categories?post=722"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/tags?post=722"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/yst_prominent_words?post=722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}