Home

Awesome

Ladon Scanner For Golang

Wiki

http://k8gege.org/Ladon/LadonGo.html<br>

Author Ladon Bin GitHub issues Github Stars GitHub forks GitHub license Downloads

Introduction

LadonGo is an open source intranet penetration scanner framework, which can be used to easily detect segment C, B, A live hosts, fingerprint identification, port scanning, password explosion, remote execution, high-risk vulnerability detection, etc. Version 4.0 includes 37 functions, high risk vulnerability detection MS17010, SmbGhost, remote execution of SshCmd, WinrmCmd, PhpShell, JspShell, GoWebShell, L, 12 protocol password explosion Smb/Ssh/Ftp/Mysql/Mssql/Oracle/Sqlplus/Winrm/HttpBasic/Edits/MongoDB/RouterOS, survival detection/information collection/fingerprint identification NbtInfo, OnlinePC, Ping, Icmp, SnmpScan, HttpBanner, HttpTitle, TcpBanner, WeblogicScan, O xidScan, Port scan / service probe portscan, forward to Socks5 proxy< br>

LadonGO 5.2 Pentest Scanner framework 全平台Go开源内网渗透扫描器框架,Windows/Linux/Mac内网渗透,使用它可轻松一键批量探测C段、B段、A段存活主机、高危漏洞检测MS17010、SmbGhost,远程执行SSH/Winrm,密码爆破SMB/SSH/FTP/Mysql/Mssql/Oracle/Winrm/HttpBasic/Redis,端口扫描服务识别PortScan指纹识别/HttpBanner/HttpTitle/TcpBanner/Weblogic/Oxid多网卡主机,端口扫描服务识别PortScan。

Development environment

OS: Kali 2019 X64<br>

IDE: Mousepad<br>

Go: 1.13 Linux<br>

Function module

Detection

..
OnlinePC(Using ICMP/SNMP/Ping detect Online hosts)
PingScan(Using system ping to detect Online hosts)
IcmpScan(Using ICMP Protocol to detect Online hosts)
SnmpScan(Using Snmp Protocol to detect Online hosts)
HttpBanner(Using HTTP Protocol Scan Web Banner)
HttpTitle(Using HTTP protocol Scan Web titles)
T3Scan(Using T3 Protocol Scan Weblogic hosts)
PortScan(Scan hosts open ports using TCP protocol)
TcpBanner(Scan hosts open ports using TCP protocol)
OxidScan(Using dcom Protocol enumeration network interfaces)
NbtInfo(Scan hosts open ports using NBT protocol)

VulDetection

..
MS17010(Using SMB Protocol to detect MS17010 hosts)
SmbGhost(Using SMB Protocol to detect SmbGhost hosts)
CVE-2021-21972(Check VMware vCenter 6.5 6.7 7.0 Rce Vul)
CVE-2021-26855(Check CVE-2021-26855 Microsoft Exchange SSRF)

BruteForce

..
SmbScan(Using SMB Protocol to Brute-For 445 Port)
SshScan(Using SSH Protocol to Brute-For 22 Port)
FtpScan(Using FTP Protocol to Brute-For 21 Port)
401Scan(Using HTTP BasicAuth to Brute-For web Port)
MysqlScan(Using Mysql Protocol to Brute-For 3306 Port)
MssqlScan(Using Mssql Protocol to Brute-For 1433 Port)
OracleScan(Using Oracle Protocol to Brute-For 1521 Port)
MongodbScan(Using Mongodb Protocol to Brute-For 27017 Port)
WinrmScan(Using Winrm Protocol to Brute-For 5985 Port)
SqlplusScan(Using Oracle Sqlplus Brute-For 1521 Port)
RedisScan(Using Redis Protocol to Brute-For 6379 Port)

RemoteExec

..
SshCmd(SSH Remote command execution Default 22 Port)
WinrmCmd(Winrm Remote command execution Default 5985 Port)
PhpShell(Php WebShell command execution Default 80 Port)
GoWebShell(Go WebShell Default http://IP:888/web)
WinJspShell(JSP Shell Remote command execution Default 80 Port)
LnxJspShell(JSP Shell Remote command execution Default 80 Port)
LnxRevShell(Bash Reverse Shell)

Exploit

..
PhpStudyDoor(PhpStudy 2016 & 2018 BackDoor Exploit)
CVE-2018-14847(Export RouterOS Password 6.29 to 6.42)

Socks5

..
Socks5(Socks5 forward proxy server)

Build

go get github.com/k8gege/LadonGo
go build Ladon.go

Make

make windows
make linux
make mac

Install

Linux/Mac

make install

Windows

go run install.go

Usage

help

Ladon FuncList
Ladon Detection
Ladon VulDetection
adon BruteFor
Ladon RemoteExec
Ladon Exploit
Ladon Example

Usage

Ladon IP/pcname/CIDR/URL/txt moudle

Ladon 192.168.1.8 MS17010
Ladon 192.168.1.8/24 MS17010
Ladon 192.168.1/c MS17010
Ladon 192.168/b MS17010
Ladon 192/a MS17010

Ladon 192.168.1-192.168.5 MS17010
Ladon http://192.168.1.8:8080 BasicAuthScan
Ladon ip.txt MS17010
Ladon url.txt HttpBanner

Examples

Forward Socks5 proxy server

Ladon Socks5 192.168.1.8 1080

Information collection and vulnerability detection

Ping scan segment C live hosts (with any permission) < br >

Ladon 192.168.1.8/24 PingScan<br>

ICMP scanning section C survival host (administrator authority)<br>

Ladon 192.168.1.8/24 IcmpScan<br>

SNMP scanning of surviving hosts and devices in Segment C<br>

Ladon 192.168.1.8/24 SnmpScan<br>

SMB scans C-segment eternal blue ms17010 vulnerable hosts < br >

Ladon 192.168.1.8/24 MS17010<br>

SMB scans C-segment eternal black smbghost vulnerability host < br >

Ladon 192.168.1.8/24 SmbGhost<br>

T3 scans the hosts with open WebLogic in Segment C<br>

Ladon 192.168.1.8/24 T3Scan<br>

HTTP scanning C-segment open Web site Banner<br>

Ladon 192.168.1.8/24 BannerScan<br>

HTTP scanning section C open Web site title<br>

Ladon 192.168.1.8/24 HttpTitle<br>

TCP scans the open port service information of section C. < br >

Ladon 192.168.1.8/24 TcpBanner<br>

TCP scans common open ports of segment C hosts<br>

Ladon 192.168.1.8/24 PortScan<br>

Password explosion, weak password

Scan weak password of windows machine on port 445 of section C. < br >

Ladon 192.168.1.8/24 SmbScan<br>

Scan the SSH weak password of the 22 port Linux machine in section C<br>

Ladon 192.168.1.8/24 SshScan<br>

Scan the weak password of FTP server on port 21 of section C. < br >

Ladon 192.168.1.8/24 FtpScan<br>

Scan the weak password of MySQL server on port 3306 in section C<br>

Ladon 192.168.1.8/24 MysqlScan<br>

Scan weak password of Oracle server on port 1521 in segment C<br>

Ladon 192.168.1.8/24 OracleScan<br>

Scan the weak password of MongoDB server on port 27017 in section C<br>

Ladon 192.168.1.8/24 MongodbScan<br>

Scan weak password of Oracle server on port 1521 of section C. < br >

Ladon 192.168.1.8/24 SqlplusScan<br>

Scan section C 5985 port Winrm server weak password<br>

Ladon 192.168.1.8/24 WinrmScan<br>

Scan the empty password of redis server on port 6379 of section C. < br >

Ladon 192.168.1.8/24 RedisScan<br>

Scan C-segment 8728 port Routeros router < br >

Ladon 192.168.1.8/24 RouterOSScan<br>

Remote command execution
Ladon SshCmd host port user pass cmd
Ladon WinrmCmd host port user pass cmd
Ladon PhpShell url pass cmd
Ladon PhpStudyDoor url cmd

SshCmd & WinrmCmd image

PhpShell & PhpStudyDoor image

SCAN IP/24 (192.168.1/c)

...
ICMP3ms1/20s
WebTitle10ms1/6s
T3Scan15ms1/4s
EthScan2ms1/30s

Scan B(192.168/b)

...
EthScan23Min1 Port
T3Scan1h4 Port
WebTitle40Min1 Port
MS1701012Min1 Port
Snmp20Min1 Port

PS: the scanning speed is actually similar to the speed of Ladon. Net version, but there is no special record, because the speed of go version is recorded by the way during the rewrite test

Cross platform / whole platform / whole system

Support old and new operating systems, especially old Linux systems. Many online tools can't be used at all or various errors are reported

TestOn

IDOS
0WinXP
1Win 2003
2Win 7
3Win 8.1
4Win 10
5Win 2008 R2
6Win 2012 R2
7Win 2019
8Kali 1.0.2
9Kali 2018
10Kali 2019
11SUSE 10
12CentOS 5.8
13CentOS 6.3
14CentOS 6.8
15Fedora 5
16RedHat 5.7
17BT5-R3
18MacOS 10.15
19Ubuntu 8
20Ubuntu 18

MacOS x64 10.15

image

Linux

image

Windows

image

Download

LadonGo (ALL OS)

https://github.com/k8gege/LadonGo/releases<br> http://k8gege.org/Download/LadonGo.rar

Ladon (Windows & Cobalt Strike)

History: https://github.com/k8gege/Ladon/releases<br> 911 Ver:http://k8gege.org/Download<br>

<div style="text-align: center; width: 710px; border: green solid 0px;"> <img alt="" src="http://k8gege.org/img/k8team.jpg" style="display: inline-block;width: 250px;height: 300px;" /> </div>

Stargazers over time

Stargazers over time

<img align='right' src="https://profile-counter.glitch.me/LadonGo/count.svg" width="200">