Skip to content

Usage of cryptosploit

/SNESE_AR edited this page May 7, 2022 · 1 revision

πŸƒβ€β™€οΈ Usage of Cryptosploit

Most popular commands.

help

Read more about any command

crsconsole> help
Documented commands (type help <topic>):
========================================
cd  exit  get  help  run  search  set  shell  unset  use
crsconsole> help search
        Search modules by keyword.
        Example: search rot
        

search

You can search modules by regular expressions

crsconsole> search rot
[>] Founded:
symmetric.rot

use

Then just type use founded.module

crsconsole> use symmetric.rot
[>] Loading module...
[>] Module loaded successfully

get

Get the module variables

crsconsole (symmetric.rot)> get
╒══════════╀════════════════════════════╀═════════════════════════════════════════════════════════════════╕
β”‚ Name     β”‚ Value                      β”‚ Description                                                     β”‚
β•žβ•β•β•β•β•β•β•β•β•β•β•ͺ════════════════════════════β•ͺ═════════════════════════════════════════════════════════════════║
β”‚ mode     β”‚ attack                     β”‚ Operation mode. May be attack/decrypt/encrypt                   β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚ key      β”‚ 1                          β”‚ Value of key                                                    β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚ input    β”‚                            β”‚ Initial string                                                  β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚ alphabet β”‚ ABCDEFGHIJKLMNOPQRSTUVWXYZ β”‚ Initial alphabet                                                β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚ contains β”‚                            β”‚ Used in attack mode, algo will search this substring.           β”‚
β”‚          β”‚                            β”‚ If value is an empty string, all possible lines will be printed β”‚
β•˜β•β•β•β•β•β•β•β•β•β•β•§β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•§β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•›

set

You can set module variables with set variable value command.

crsconsole (symmetric.rot)> set mode encrypt
[>] Setting mode -> encrypt
crsconsole (symmetric.rot)> set key 13
[>] Setting key -> 13
crsconsole (symmetric.rot)> set input test
[>] Setting input -> test

run

Type run to execute module functionality

crsconsole (symmetric.rot)> run
[+] Result:
grfg

Shell commands

You can execute shell commands in the cryptosploit console.

crsconsole> echo "Hello, cryptosploit" > hello
[*] Executing 'echo "Hello, cryptosploit" > hello'
crsconsole> cat hello
[*] Executing 'cat hello'
Hello, cryptosploit
crsconsole> rm hello
[*] Executing 'rm hello'

Summary

That's all the basics of cryptosploit usage.

To get more information about cryptosploit and writing of the modules check our modules wiki and documentation.