Scrying is a new tool for collecting RDP, web and VNC screenshots all in one place.
This tool is still a work-in-progress and should be mostly usable but is not yet complete. Please file any bugs or feature requests as GitHub issues
Caveats
Motivation
Since Eyewitness recently dropped support for RDP there isn’t a working CLI tool for capturing RDP screenshots. Nessus still works, but it’s a pain to get the images out and they’re not included in the export file.
I thought this was a good opportunity to write a fresh tool that’s more powerful than those that came before. Check out the feature list!
Installation
For web screenshotting, scrying currently depends on there being an installation of Chromium or Google Chrome. Install with pacman -S chromium
or the equivalent for your OS.
Download the latest release from the releases tab. There’s a Debian package available for distros that use them (install with sudo dpkg -i scrying*.deb
), and zipped binaries for Windows, Mac, and other Linuxes.
Usage
Grab a single web page, RDP server, or VNC server:
$ scrying -t http://example.com
$ scrying -t rdp://192.0.2.1
$ scrying -t 2001:db8::5 –mode web
$ scrying -t 2001:db8::5 –mode rdp
$ scrying -t 192.0.2.2
$ scrying -t vnc://[2001:db8::53]:5901
Automatically grab screenshots from an nmap output:
$ nmap -iL targets.txt -p 80,443,8080,8443,3389 -oX targets.xml
$ scrying –nmap targets.xml
Choose a different output directory for images:
$ scrying -t 2001:db8::3 –output-dir /tmp/scrying_outputs
Run from a targets file:
$ cat targets.txt
http://example.com
rdp://192.0.2.1
2001:db8::5
$ scrying -f targets.txt
Run through a web proxy:
$ scrying -t http://example.com –web-proxy http://127.0.0.1:8080
$ scrying -t http://example.com –web-proxy socks5://\[::1\]:1080
Image files are saved as PNG in the following directory structure:
output
├── report.html
├── rdp
│ └── 192.0.2.1-3389.png
├── vnc
│ └── 192.0.2.1-5900.png
└── web
└── https_example.com.png
Check out the report at output/report.html
!
Features
Features with ticks next to them have been implemented, others are TODO
Sample HTML report
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…