Exploit Pack is an integrated environment for performing and conducting professional
penetration tests. As any tool of this type, it requires some basic knowledge and expertise in
the matter. Exploit Pack has been designed to be used by hands-on security professionals
to support their testing process.
With a little bit of effort, anyone can start using the core
features of Exploit Pack to test in-depth the security of their applications. Some Exploit
Pack’s more advanced features will take further learning and experience to master. All of
this time-investment is hugely worth it.
The interface is intuitive and user-friendly and we believe that the best way to start learning
is by doing, by following this manual you will learn the basics of Exploit Pack, we
recommend to also join our community chat on discord so you can share with other users
your journey along the way
Some Exploit Pack’s more advanced features will take further learning and experience to
master. We recommend to set up a lab environment and play with the tool so you can
discover and take full advantage of all the capabilities and features that Exploit Pack has
Exploit Pack at his core is a Java Desktop application this makes it multiplatform, and it
means that it will run in any operating system such as Windows, Linux or Mac. This guide
will help you install and configure it in your desired OS.
As any other Java application it will require you to install a JVM first, you can decide to use
OpenJDK or Oracle Java, but in any case you should always consider to use a version of
Java higher than 8, at the moment of writing this guide the latest Java version is 15, as you
use the newest Java version you will also get speed performance boosts, better support
and a more stable instace to work with.
Setting up the environment for Exploit Pack:
First you need to decide where to run Exploit Pack from, we recommend to run it from a VM
( Virtual Machine ) such as VMWare or Virtual Box. Exploit Pack as any other security tool
of his type includes exploits ( script codes ) and utilities that will be detected, and with
good reason, by your Antivirus and might conflict with your work session while using
Exploit Pack. In the worst case scenario an AV could even delete files and corrupt your
Exploit Pack installation. In any case, during a penetration test or a red team excercise you
should always work from an isolated environment and not your working desktop machine.
Exploit Pack – technical requirements:
To run Exploit Pack you will need at least 500mb of disk space, around 4gb or more of RAM
and a modern CPU capable of handling multi-threading applications at ease. As mentioned
above, any operating system will do the trick as long as a JVM is properly installed, this
takes us to the next section.
JAVA installation – Step by step:
Once you have decided on the operating system to use as host for Exploit Pack, then you
must install Java to be able to run Exploit Pack.
Java is a class-based, object-oriented programming language that is designed to have as
few implementation dependencies as possible. It is a general-purpose programming
language intended to let application developers write once, run anywhere, meaning tha
compiled Java code can run on all platforms that support Java without the need for
recompilation.Java applications are typically compiled to bytecode that can run on any
Java virtual machine (JVM) regardless of the underlying computer architecture.
You can verify if you have Java already installed in your operating system by opening a
terminal and running the following command, this is an example for Windows but the same
command will work for Linux and Mac, on this case the command shows us that we have
the version 11.0.9 of Java installed.
Exploit Pack is compatible with OpenJDK and Oracle Java, any flavour of Java higher than
8 will do the trick and work just fine.
Install Java on Linux ( debian-based ) or Mac:
apt-get install default-jdk
brew install –cask oracle-jdk
Download Java from Oracle:
We choose not to provide a link to download Java because it might change at the time you
read this manual, just make sure that you download a version from the internet equal or
higher than the one shown below
We have choosen to use Nmap as our main network scanning tool, as it is very well know in
the scene and most important, it is a stable tool. Nmap (“Network Mapper”) is an open
source tool for network exploration and security auditing. iI was designed to rapidly scan
large networks, although it works fine against single hosts. Follow these steps to obtain a
list of open ports from the target machine, this is a crucial step on any pentest and should
be done correctly.
To run the scanner, from the tab selection on the left side of the screen choose the “Utilities”
tab, click on the black arrow next to “Scanner” and as you see on the image below, select
“Nmap-scanner”. ( If you haven’t configured the Nmap Path under preferences this is a
good time to do it. )
Specify a target to be scanned using Nmap by typing the IP Address or Hostname. Click on
the button “Execute Auxiliary” and you will hear a voice saying: “New auxiliary deployed”
and a bar on the bottom right part of your screen. Now you can wait until the scan is
completed, this might take several minutes depending on your connection and the target
response, another factor to consider would be the options choosen for this scan, for
example a full scan of 1-65k ports will take longer than a simple scan to the top 1024 ports
Exploit Pack has a feature called AutoPwn that can be used to automagically try to select
the exploit needed to like it name claims “Pwn” the target, while we always recommed to
use a more manual approach sometime it’s useful if you are too lazy that day, beware of
the risks of automated attacks.
Also have in mind that the filter to iterate over the XML files to select the exploits is preconfigured by ports, references or services running, and as you imagined first it will launch
Nmap against the target to obtain these values. You must first configure Nmap properly
otherwise AutoPwn will not work.
Here in this example we are running AutoPwn against our local environment:
While you are doing a pentest, besides using the “Targets” tab to take notes on each asset
you are testing we had the need to add some general notes for the whole pentest or project,
this is particularly usefull if your pentest last for more than a few days or if you have
several targets that use different networks.
You can use this notepad to keep a track, here is how to use it, as you can see in the
screenshot below, just click on the toolbar the button called “Notepad” hide it from the rest
of the Windows or Save the current work. Simple, and usefull 🙂
Here you can select the desired language you want your shell, then type the address of
Exploit Pack where the shell is going to connect back to. On this example we are creating a
simple PHP one liner that could be run as a webshell for example. Ready to run it? You need
Zip Password : www.masterscyber.com