Cybersecurity framework developed in C, Ansi-style
Intended for auditing/security assessment, the program scan by using a TCP Stealth mode, the X top risk ports of a server (max. 5000) or all ports, and, eventually, it carries out some hacking procedures (port banner grabbing, CERT grabbing, BFA, DoS, Metasploits, nMap scripts, etc.) on opened ports by running own code (using, mainly: sockets, libpcap, libnet, libSSH2, and libCurl, among others libraries) and/or the latest free third-party softwares (for instance: Dig, Fierce, nMap, Metasploit, SQLMap, among others).
The main objective of the program is provide a framework with the essentials commands/tools for ensuring, by their use, a well-knowledge of the effectiveness and efficiency of the implemented controls, in order to evaluate the residual risk of an assessment.
Finally, just mention that, since v1.2.4, I started to incorporate AI into the program in order to support a revision and conclusions.
Note (v1.2.8: 20240414): due to personal goals & scoping, the development of the program will begin to slow down.
Follow the rabbit...
sudo apt-get install libcurl4-gnutls-dev libssh2-1-dev libmysqlclient-dev libc6-dev libpq-dev libsmbclient-dev libssl3 libodbc2 libreadline-dev libpcap0.8-dev libnet1-dev libftp-dev unixodbc-dev libesmtp-dev
Note: ODPI-C does require Oracle Client libraries: https://odpi-c.readthedocs.io/en/latest/user_guide/installation.html
git clone https://github.com/lucho-a/Auditing-Cybersecurity.git
cd Auditing-Cybersecurity/src
gcc -o "auditing-cybersecurity" auditing-cybersecurity.c auditing-cybersecurity.h others/* ports/* activities/* libs/libodpi/* libs/libOCL/* -lsmbclient -lnet -lpcap -lreadline -lm -lodbc -lcrypto -lssl -lcurl -lssh2 -lpq -lmysqlclient -lftp -lesmtp
set -e
sudo setcap CAP_NET_RAW=+eip auditing-cybersecurity
Optional (recommended) third-party software's:
sudo apt-get install nmap metasploit-framework sqlmap fierce dnsenum traceroute whois
Then, you will need "resource" files in order to perform the scanning, and specifying the different brute force attack usernames & password files, HTTP grabbing files, etc.: link
Finally:
auditing-cybersecurity --help
Arising all the time.
(Under development)
Any doubt, suggestion or feedback, pls, just contact me.