PAKURI is a penetration test tool with a terminal user interface (TUI) that can be operated with just the keypad.
I've consulted many pen testing tools. I then took the good points of those tools and incorporated them into my own tools. In Japanese slang, imitation is also called "paku-ru".
ぱくる (godan conjugation, hiragana and katakana パクる, rōmaji pakuru)
- eat with a wide open mouth
- steal when one isn't looking, snatch, swipe
- copy someone's idea or design
- nab, be caught by the police
PAKURI is a semi-automated, user-friendly framework for penetration testing tools. Using only the keypad, you can use the penetration test tool like a game.
It's also a great introductory tool for beginners. Learn the flow of penetration testing with PAKURI without having to wrestle with confusing command lines and tools.
By using our PAKURI, you will benefit from the following.
(a) Red Teams can easily perform operations such as information enumeration and vulnerability scanning.
(b) Visualizing the survey results is possible only with the numeric keypad.
(c) The Blue Team can experience a dummy attack by simply operating the numeric keypad even they do not have any penetration testing skill.
(d) PAKURI has been created to support the early stages of penetration testing. These can be achieved with what is included in Kali-Tools. It can be useful for training the entry level pentesters.
|If you are interested, please use them in an environment under your control and at your own risk. And, if you execute the PAKURI on systems that are not under your control, it may be considered an attack and you may have legally liabillity for your action.|
Update your apt and install git:
[email protected]:~$ sudo apt update [email protected]:~$ sudo apt install git
PAKURI uses the Docker. If you don't have it installed, you can install it by following the steps below.
Install Docker. (I've been promoted to administrator privileges to reduce the amount of work involved. Add the GPG key from the official Docker repository to the system.
[email protected]:/home/kali# curl -fsSL https://download.docker.com/linux/debian/gpg | apt-key add -
Add the Docker repository to the APT source. (kali base debian)
[email protected]:/home/kali# echo 'deb [arch=amd64] https://download.docker.com/linux/debian buster stable' > /etc/apt/sources.list.d/docker.list
Update the repository and install docker-ce and docker-compose.
[email protected]:~$ sudo apt update [email protected]:~$ sudo apt install docker-ce -y [email protected]:~$ sudo apt install docker-compose -y
Download the PAKURI installer from the PAKURI Github repository:
[email protected]:~$ git clone https://github.com/01rabbit/PAKURI.git
CD into the PAKURI folder and run the setup script:
[email protected]:~$ cd PAKURI [email protected]:~/PAKURI$ chmod +x setup.sh [email protected]:~/PAKURI$ ./setup.sh
Install OpenVAS/GVM if haven’t done so:
sudo apt install -y openvas or sudo apt install -y gvm
Initialize Faraday if you haven't done so:
sudo systemctl start postgresql sudo faraday-manage initdb | tee faraday-setup.log
Include the credentials in pakuri.conf:
[email protected]:~/PAKURI$ vim pakuri.conf ...snip... # OpenVAS OMPUSER="admin" OMPPASS="admin"
Faraday-server is started. After starting up, access from your browser and register your workspace:
[email protected]:~/PAKURI$ systemctl start faraday.service [email protected]:~/PAKURI$ firefox localhost:5985
Register the workspace you just registered in pakuri.conf:
[email protected]:~/PAKURI$ vim pakuri.conf ...snip... # Faraday WORKSPACE="test_workspace"
[email protected]:~/PAKURI$ ./pakuri.sh
PAKURI is not fully automated and requires the user interactions, to make sure to proceed the pentest and to avoid any unintended attack or trouble.
Thanks to @cyberdefense_jp for contribute so many awesome ideas to this tool.