Pentesting Tools
Athena hacking tool surface mainly leverages on Athena and Nixpkgs repositories.
Athena repository is an Arch-based Linux repository started as a fork of BlackArch repository. Its repository contains 2800+ tools, classified for categories. You can install tools individually or in groups according to the categories they belong. Athena repository is compatible with all Arch-based distributions.
Nixpkgs repository is the official Nix repository containing also all the pentesting tools deployed by the community.
Hacking tools can be installed and used in several ways by:
- Single tools
- Cyber Security roles
- Red Team menu
- Categories
Single tools
For installing a single tool, in Athena Arch you can simply run sudo pacman -S <tool-name>
while in Athena Nix you can simply declare it inside /etc/nixos/configuration.nix
or run it in an ephimeral environment by nix-shell -p <tool-name>
.
Cyber Security roles
Cyber Security roles allow to install hacking tools according to a specific role. Each one of these roles is linked to a package that is installed according to the following table:
Role | Command |
---|---|
π Blue Teamer π | cyber-toolkit blue |
π Bug Bounty Hunter π | cyber-toolkit bugbounty |
π Cracker Specialist π | cyber-toolkit cracker |
π DoS Tester π | cyber-toolkit dos |
π Enthusiast Student π | cyber-toolkit student |
π Forensic Analyst π | cyber-toolkit forensic |
π¦ Malware Analyst π¦ | cyber-toolkit malware |
π± Mobile Analyst π± | cyber-toolkit mobile |
π Network Analyst π | cyber-toolkit network |
π΅οΈ OSINT Specialist π΅οΈ | cyber-toolkit osint |
β€οΈ Red Teamer β€οΈ | cyber-toolkit red |
πΈοΈ Web Pentester πΈοΈ | cyber-toolkit web |
In Athena Arch, if you wish to know what are the tools for each role, you can use two methods:
- opening Athena Welcome and click on Show Tools for Roles button
- you can filter the roles by the button on the bottom side
- running
pacman -Sii <role-package> | grep -Po '^Depends On\s*: \K.+' | head -1
- where
<role-package>
should be replaced by the package of a role, for exampleathena-redteamer
.
- where
In Athena Nix, these roles are deployed by /etc/nixos/modules/cyber
module and the user can customize it as desired.
Inside the role module files, the user can see what are the specific tools installed for each role.
You can set your Cyber Security role as described here.
In Athena Arch, you can set more than one role, Athena Welcome will keep the latest set role. During the download of packages for a role, in case the process is interrupted, donβt worry, you donβt need to download from scratch because the downloaded packages are temporarily saved in pacman cache.
In Athena Nix, to set more than one role, it is needed to manually edit /etc/nixos/configuration.nix
and add a further line invoking the second role Nix module.
Red Team menu
Athena OS GNOME uses Red Team menu for accessing to the main hacking tools. It is better described in detail here.
Categories
Athena Arch shows several categories deployed as package group that users can install by sudo pacman -S <category>
:
Category | Description |
---|---|
athena-anti-forensic | Countering forensic activities. |
athena-automation | Workflow automation. |
athena-automobile | Analyzing automotive applications. |
athena-backdoor | Exploiting or open backdoors on already vulnerable systems. |
athena-binary | Operating on binary in some form. |
athena-bluetooth | Using Bluetooth attacks. |
athena-code-audit | Auditing existing source code for vulnerability analysis. |
athena-cracker | Cracking cryptographic functions. |
athena-crypto | Working with cryptography, with the exception of cracking. |
athena-database | Database exploitations on any level. |
athena-debugger | Debugging resources in realtime. |
athena-decompiler | Reversing a compiled program into source code. |
athena-defensive | Protecting resources from malware and attacks. |
athena-disassembler | Producing assembly output rather than the raw source code. |
athena-dos | Using DoS (Denial of Service) attacks. |
athena-drone | Managing physically engineered drones. |
athena-exploitation | Taking advantages of exploits in other programs or services. |
athena-fingerprint | Exploiting fingerprint biometric equipment. |
athena-firmware | Exploiting vulnerabilities in firmware. |
athena-forensic | Finding information on physical disks or embedded memory. |
athena-fuzzer | Fuzzing tools. |
athena-hardware | Exploiting or managing anything to do with physical hardware. |
athena-honeypot | Acting as βhoneypotsβ, i.e., programs that appear to be vulnerable services used to attract hackers into a trap. |
athena-ids | Intrusion Detection System tools. |
athena-keylogger | Recording and retaining keystrokes on a target system. |
athena-malware | Malicious software or malware detection. |
athena-misc | Miscellaneous tools. |
athena-mobile | Manipulating mobile platforms. |
athena-networking | Scanning selected systems for vulnerabilities or information about the network. |
athena-nfc | NFC technology tools. |
athena-packer | Operating on or involve packers. |
athena-proxy | Acting as a proxy, i.e., redirecting traffic through another node on the internet. |
athena-radio | Operating on radio frequency. |
athena-recon | Actively seeking vulnerable exploits in the wild. |
athena-reversing | Any decompiler, disassembler or any similar program. |
athena-scanner | Scanning selected systems for vulnerabilities or information about the network. |
athena-sniffer | Analyzing network traffic. |
athena-social | Social engineering attacks. |
athena-spoof | Spoofing attacker entity. |
athena-stego | Analyzing resources for hidden information. |
athena-tunnel | Tunneling network traffic on a given network. |
athena-voip | Operating on VoIP programs and protocols. |
athena-webapp | Web application attacks tools. |
athena-windows | Native Windows packages. |
athena-wireless | Operating on wireless networks on any level. |
Issues
In Athena Nix, during the installation of a role, if you get an error that interrupts the process, detect what is the tool package is producing the error, edit /etc/nixos/modules/roles/<your-role>/default.nix
and comment or delete the line containing the tool package name and reinstall the role.