CIP Cyber

Habu: Python Network Hacking Toolkit

Table of Contents

These are essential capacities that assist with a few undertakings for Ethical Hacking and Penetration Testing. A great part of the capacities are truly essential (like get our open IP address), however are truly valuable sometimes.

Habu requires:

 

  • Click
  • Python (3.x),
  • Scapy-Python3
  • Matplotlib (Optional, only needed if you want to make some graphs)

 

Verbose Mode

Almost all commands implement the verbose mode with the ‘-v’ option. This can give you some extra info about what habu is doing.

Some Essential Commands:

 

  • habu.arpoison: ARP Poisoning

This command sends ARP ‘is-at’ packets to each victim, poisoning their ARP tables for send the traffic to your system.

  • habu.arpsniff: Discover devices on your LAN capturing ARP packets

This command listen for ARP packets and shows information each device.

  • habu.contest: Check your connection capabilities

This command tries to connect to various services and check if you can reach them using your internet connection.

 

  • habu.dhcp_discover: Discover DHCP servers

This command send a DHCP request and shows what devices has replied. Using the ‘-v’ parameter (verbose) you can see all the options (like DNS servers) included on the responses.

  • habu.eicar: Prints the EICAR test string

This command prints the EICAR test string that can be used to test antimalware engines.

  • habu.hasher: Computes various hashes with the input data

This command computes various hashes for the input data, that can be a file or a stream.

  • habu.ip: Prints your current public IP

This command prints your current public IP based on the response from https://api.ipify.org.

  • habu.isn: Prints the TCP sequence numbers for an IP

This command creates TCP connections and prints the TCP initial sequence numbers for each connections.

  • habu.land: Implements the LAND attack

This command implements the LAND attack, that sends packets forging the source IP address to be the same that the destination IP. Also uses the same source and destination port. The attack is very old, and can be used to make a Denial of Service on old systems, like Windows NT 4.0. More

  • habu.ping: ICMP echo requests

This command implements the classic ‘ping’ with ICMP echo requests.

  • habu.snmp_crack: SNMP Community Cracker

This command launches snmp-get queries against an IP, and tells you when finds a valid community string (is a simple SNMP cracker). The dictionary used is the distributed with the onesixtyone tool

  • habu.synflood: SYN Flood Attack Implementation

This command launches a lot of TCP connections and keeps them opened. Some very old systems can suffer a Denial of Service with this.

  • habu.tcpflags: TCP Flag Fuzzer

This command send TCP packets with different flags and tell you what responses receives. It can be used to analyze how the different TCP/IP stack implementations and configurations responds to packet with various flag combinations.

CIP Cyber Staff

CIP Cyber Staff

CIP Cyber Staff comprises CIP cybersecurity experts committed to delivering comprehensive information on critical infrastructure protection. The content covers diverse topics, equipping professionals to defend organizations and communities in an ever-evolving cyber landscape.

Most popular

Industrial Cybersecurity

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings

Related Articles

What Proxies Are For

When you cannot access certain sites or hide your identity, you need a tool for that. For example, the USA proxies are in demand among

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings