A2P2V is an attack tool that allows users to specify a set of attacks on a specific target. The purpose of the program is to simplify the attack process so that security experts can have a clear picture of the safety of their machines, using as much automation as possible and creating easy reports.
Contents
hide
Prerequisites
- python> = 3.6
- Metasploit RPC daemon running. (Default configuration uses port 55552, usname msf, password welcome1)
- python-tk
Installation
mkdir $ HOME / .venvs /
python3 -m venv .venvs / a2p2v
source .venvs / a2p2v / bin / activate
cd a2p2v /
pip install.
Use
$ a2p2v –plan
TREE#|SCORE|HOPS |FINAL CAPABILITY OPTIONS |GOALS
-----|-----|--------------------------------------------------|--------------------------------------------------|---------------
0| 6.17|GW(1)>HMI(4)>OPC(4)>PLC(1) |auxiliary/scanner/scada/modbusclient |change_temp
-----|-----|--------------------------------------------------|--------------------------------------------------|---------------
1| 6.17|GW(1)>HMI(4)>USER2(4)>PLC(1) |auxiliary/scanner/scada/modbusclient |change_temp
---------------------------------------------------------------------------------------------------------------------------------
Select an attack tree to execute (or any other value to exit):
a2p2v --target USER1
TREE#|SCORE|CAPABILITY
-----|-----|--------------------------------------------------
0| 8.4|exploit/windows/smb/ms17_010_eternalblue
-----|-----|--------------------------------------------------
1| 8.4|exploit/windows/smb/ms17_010_psexec
-----|-----|--------------------------------------------------
2| 8.4|exploit/windows/smb/ms10_061_spoolss
-----|-----|--------------------------------------------------
3| 8.2|exploit/windows/rdp/cve_2019_0708_bluekeep_rce
----------------------------------------------------------------
Select a capability to execute, 'a' for all, or any other value to skip: a
You can download the program from here.
