Metadata-Version: 2.4
Name: ptsrvtester
Version: 1.0.0
Summary: Application server penetration testing tool (Penterep tool)
Home-page: https://www.penterep.com/
Author: Penterep
Author-email: xvlkov03@vutbr.cz
License: GPLv3+
Classifier: Programming Language :: Python :: 3
Classifier: Programming Language :: Python :: Implementation :: CPython
Classifier: Environment :: Console
Classifier: Topic :: Security
Classifier: License :: OSI Approved :: GNU General Public License v3 or later (GPLv3+)
Requires-Python: >=3.12
Description-Content-Type: text/markdown
License-File: LICENSE
Requires-Dist: cryptography>=42.0.8
Requires-Dist: dnspython>=2.7.0
Requires-Dist: impacket>=0.12.0
Requires-Dist: ldap3>=2.9.1
Requires-Dist: ptlibs<2,>=1.0.20
Requires-Dist: pysnmp>=7.1.20
Requires-Dist: python-whois>=0.9.5
Requires-Dist: paramiko
Requires-Dist: beautifulsoup4
Requires-Dist: httpx
Requires-Dist: h2
Requires-Dist: lxml
Requires-Dist: ssh_audit
Requires-Dist: ntlm-auth
Dynamic: author
Dynamic: author-email
Dynamic: classifier
Dynamic: description
Dynamic: description-content-type
Dynamic: home-page
Dynamic: license
Dynamic: license-file
Dynamic: requires-dist
Dynamic: requires-python
Dynamic: summary

[![penterepTools](https://www.penterep.com/external/penterepToolsLogo.png)](https://www.penterep.com/)


## PTSRVTESTER - Server Penetration Testing Tool

## Installation
```
pip install ptsrvtester
```

## Adding to PATH
If you're unable to invoke the script from your terminal, it's likely because it's not included in your PATH. You can resolve this issue by executing the following commands, depending on the shell you're using:

For Bash Users
```bash
echo "export PATH=\"`python3 -m site --user-base`/bin:\$PATH\"" >> ~/.bashrc
source ~/.bashrc
```

For ZSH Users
```bash
echo "export PATH=\"`python3 -m site --user-base`/bin:\$PATH\"" >> ~/.zshrc
source ~/.zshrc
```

## Usage examples

```
ptsrvtester snmp detection --ip 192.168.1.1
ptsrvtester dns whois -d example.com
ptsrvtester ldap banner -ip 192.168.1.1
ptsrvtester <module> -h     for help for module use
```


### Available Modules:

```
   <module>                     Select module to use
                         snmp   SNMP testing module
                         dns    DNS testing module
                         ldap   LDAP testing module
                         msrpc  MSRPC testing module
                         ftp    FTP testing module
                         ssh    SSH testing module
                         smtp   SMTP testing module
                         pop3   POP3 testing module
                         imap   IMAP testing module

   -v        --version          Show script version and exit
   -h        --help             Show this help message and exit
   -j        --json             Output in JSON format
             --debug            Enable debug messages

```

### Module Descriptions:

**SNMP Module**
- Version detection (SNMPv1, SNMPv2c, SNMPv3)
- SNMPv2 community string brute-force
- SNMPv3 user enumeration and credential brute-force
- Write permission testing
- MIB walking (SNMPv2/SNMPv3)

**DNS Module**
- DNS server information retrieval
- Reverse DNS lookup
- Zone transfer attempts
- DNS record lookup
- WHOIS queries
- Subdomain brute-forcing
- DNSSEC verification
- Zone walking (NSEC/NSEC3)

**LDAP Module**
- Server banner retrieval
- LDAP search queries
- User enumeration
- Credential brute-force
- Write permission testing

**MSRPC Module**
- Endpoint mapper enumeration
- MGMT interface enumeration
- Named pipe brute-force
- SMB/TCP/HTTP credential brute-force
- Anonymous SMB access testing
- Named pipe enumeration

**FTP Module**
- Banner grabbing
- Anonymous authentication testing
- Read/write access testing
- Credential brute-force
- FTP bounce attack testing

**SSH Module**
- Banner and host key retrieval
- Authentication method detection
- Bad public key detection
- SSH audit (CVE identification)
- Credential and private key brute-force

**SMTP Module**
- Server information gathering
- User enumeration (VRFY, EXPN, RCPT)
- NTLM information disclosure
- Open relay testing
- Credential brute-force
- Blacklist testing

**POP3 Module**
- Banner and capabilities retrieval
- Anonymous authentication testing
- NTLM authentication inspection
- Credential brute-force

**IMAP Module**
- Banner and capabilities retrieval
- Anonymous authentication testing
- NTLM authentication inspection
- Credential brute-force

```

## Dependencies

```
cryptography>=42.0.8
dnspython>=2.7.0
impacket>=0.12.0
ldap3>=2.9.1
ptlibs>=1.0.20,<2
pysnmp>=7.1.20
python-whois>=0.9.5
paramiko
beautifulsoup4
httpx
h2
lxml
ssh_audit
ntlm-auth
```


## License

Copyright (c) 2024 Penterep Security s.r.o.

ptsrvtester is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

ptsrvtester is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with ptsrvtester. If not, see https://www.gnu.org/licenses/.

## Warning

You are only allowed to run the tool against the servers and systems which
you have been given permission to pentest. We do not accept any
responsibility for any damage/harm that this application causes to your
computer, or your network. Penterep is not responsible for any illegal
or malicious use of this code. Be Ethical!
