Update quickstart.rst

This commit is contained in:
x90" * 365
2016-06-15 12:13:09 -04:00
committed by GitHub
parent 933ea6000e
commit 682aa39879

View File

@@ -1,18 +1,18 @@
Quick Start Quick Start
=========== ===========
Enteleteaor have 3 super commands available: Enteletaor have 3 super commands available:
- scan: Discover open brokers. - scan: Discover open brokers.
- tasks: handle remote tasks. - tasks: handle remote tasks.
- redis: specific actions for Redis server. - redis: specific actions for Redis server.
This document contains an overview of enteleteaor with some examples for each super commands. If you want learn more visit the :doc:`advanced`. This document contains an overview of enteletaor with some examples for each super commands. If you want learn more visit the :doc:`advanced`.
Python versions Python versions
--------------- ---------------
Enteleteaor can run in Python 2.7.x and 3.x. Python 3 is recommended, but you can use python 2.7 without problem. Enteletaor can run in Python 2.7.x and 3.x. Python 3 is recommended, but you can use python 2.7 without problem.
Getting help Getting help
------------ ------------
@@ -23,7 +23,7 @@ Super commands ``tasks`` and ``redis`` has many sub-options, you can get help us
:linenos: :linenos:
:emphasize-lines: 9-14 :emphasize-lines: 9-14
# enteleteaor scan -h # enteletaor scan -h
usage: enteletaor.py redis [-h] usage: enteletaor.py redis [-h]
{info,disconnect,dump,cache,discover-dbs,connected} {info,disconnect,dump,cache,discover-dbs,connected}
... ...
@@ -45,19 +45,19 @@ Super commands ``tasks`` and ``redis`` has many sub-options, you can get help us
Setting verbosity level Setting verbosity level
----------------------- -----------------------
Enteleteaor has 5 verbosity levels. You can modify level adding ``-v`` to command line: Enteletaor has 5 verbosity levels. You can modify level adding ``-v`` to command line:
.. code-block:: bash .. code-block:: bash
# enteleteaor -v scan -t 10.10.0.10 # enteletaor -v scan -t 10.10.0.10
# enteleteaor -vvvv scan -t 10.10.0.10 # enteletaor -vvvv scan -t 10.10.0.10
.. note:: .. note::
Be careful to put ``-v`` between enteleteaor and top action: Be careful to put ``-v`` between enteletaor and top action:
- enteleteaor -vv scan ... -> **GOOD** - enteletaor -vv scan ... -> **GOOD**
- enteleteaor scan -vv ... -> **BAD** - enteletaor scan -vv ... -> **BAD**
Quick scan Quick scan
---------- ----------
@@ -66,7 +66,7 @@ You can try to discover if some host has open brokers running running:
.. code-block:: bash .. code-block:: bash
# enteleteaor -v scan -t 10.10.0.10 # enteletaor -v scan -t 10.10.0.10
[ * ] Starting Enteletaor execution [ * ] Starting Enteletaor execution
[ * ] - Number of targets to analyze: 1 [ * ] - Number of targets to analyze: 1
[ * ] - Starting scan [ * ] - Starting scan
@@ -85,7 +85,7 @@ Also we can analyze an entire network:
.. code-block:: bash .. code-block:: bash
# enteleteaor scan -t 10.10.0.10/24 # enteletaor scan -t 10.10.0.10/24
Remote tasks Remote tasks
@@ -94,17 +94,17 @@ Remote tasks
Listing remote tasks Listing remote tasks
++++++++++++++++++++ ++++++++++++++++++++
With enteleteaor you can handle remote tasks, for example, you can list pending tasks doing: With enteletaor you can handle remote tasks, for example, you can list pending tasks doing:
.. code-block:: bash .. code-block:: bash
# enteleteaor -v tasks list-tasks -t 10.10.0.10 # enteletaor -v tasks list-tasks -t 10.10.0.10
[ * ] Starting Enteletaor execution [ * ] Starting Enteletaor execution
[ * ] - Remote process found: [ * ] - Remote process found:
[ * ] -> tasks.send_mail (param_0:str, param_1:str, param_2:str) [ * ] -> tasks.send_mail (param_0:str, param_1:str, param_2:str)
[ * ] Done! [ * ] Done!
Enteleteaor is telling us that it has discovered a task, called ``tasks.send_mail`` with 3 parameters, and the type of parameter by their position. Enteletaor is telling us that it has discovered a task, called ``tasks.send_mail`` with 3 parameters, and the type of parameter by their position.
.. note:: .. note::
@@ -132,13 +132,13 @@ This task can match with this programing function, i.e:
Dumping tasks content Dumping tasks content
+++++++++++++++++++++ +++++++++++++++++++++
Enteleteaor not only permit us listing remote tasks, it also can dump their content: Enteletaor not only permit us listing remote tasks, it also can dump their content:
.. code-block:: bash .. code-block:: bash
:linenos: :linenos:
:emphasize-lines: 6-8,12-14,18-20 :emphasize-lines: 6-8,12-14,18-20
# enteleteaor tasks raw-dump -t 10.10.0.10 # enteletaor tasks raw-dump -t 10.10.0.10
[ * ] Starting Enteletaor execution [ * ] Starting Enteletaor execution
[ * ] Found process information: [ * ] Found process information:
[ * ] - Remote process name: 'tasks.send_mail' [ * ] - Remote process name: 'tasks.send_mail'
@@ -173,7 +173,7 @@ If you want list remote Redis server information, only type:
.. code-block:: bash .. code-block:: bash
# enteleteaor redis info -t 10.10.0.10 # enteletaor redis info -t 10.10.0.10
[ * ] Starting Enteletaor execution [ * ] Starting Enteletaor execution
[ * ] Config for server '10.10.0.10': [ * ] Config for server '10.10.0.10':
[ * ] - appendonly: no [ * ] - appendonly: no
@@ -192,7 +192,7 @@ We can also list all connected users to Redis server. A user could be a web appl
.. code-block:: bash .. code-block:: bash
# enteleteaor redis connected -t 10.10.0.10 # enteletaor redis connected -t 10.10.0.10
[ * ] Starting Enteletaor execution [ * ] Starting Enteletaor execution
[ * ] Connected users to '10.10.0.10': [ * ] Connected users to '10.10.0.10':
[ * ] - 10.10.0.2:52748 (DB: 0) [ * ] - 10.10.0.2:52748 (DB: 0)
@@ -211,7 +211,7 @@ Enteletaor has a module to help us to recover passwords for remote servers. Usag
.. code-block:: bash .. code-block:: bash
# enteleteaor brute password -t 10.10.0.10 # enteletaor brute password -t 10.10.0.10
[ * ] Starting Enteletaor execution [ * ] Starting Enteletaor execution
[ * ] - Detected 'Redis' server with 'auth'. [ * ] - Detected 'Redis' server with 'auth'.
[ * ] - Starting bruteforcer using wordlist : '/Users/Dani/Documents/Projects/enteletaor/enteletaor_lib/resources/wordlist/10_million_password_list_top_1000.txt' [ * ] - Starting bruteforcer using wordlist : '/Users/Dani/Documents/Projects/enteletaor/enteletaor_lib/resources/wordlist/10_million_password_list_top_1000.txt'