Nmap automation script useful for beginner in recon process of HTB Boxes
by 4ung - Saturday February 3, 2024 at 10:09 AM
#1
I had successfully created the nmap automation script by python language to recon the box which will be useful in pentesting practice.

You may can check.
nmap_automation.py

Work Flow:
1) Nmap port scan on the target host
2) Filter opened ports
3) service, os, scripts scan on the open ports
4) Print the results in the terminal and saved in the files.

Preview Video of Usage
Reply
#2
that's really cool, does it scan UDP ports as well?
Reply
#3
(Feb 03, 2024, 10:18 AM)alph4byt33 Wrote: that's really cool, does it scan UDP ports as well?

Thanks for asking.
For sure, we can edit to scan including udp ports by adding -u flag.

I'll edit it for better.
Reply
#4
alright that's awesome, thanks a lot
Reply
#5
Thisis so cool, I will try to make one but that automated the whole recon

Thanks for posting, I downloading now

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching.
Reply
#6
thanks for sharing
Reply
#7
Okay, that's great, many thanks.
poly track
Reply
#8
great bro! thanks, keep improving, your thread is very useful
nice script

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Scraping | Contact us via https://breachforums.rs/misc.php?action=help&hid=27 if you feel this is incorrect.
Reply
#9
hello,

i suggest you to add the "-n" option to avoid DNS resolution

Here is the bash function that i use.
The first arg is the @IP of the target (target.htb by default is the common name i use) and the second arg is the name of the log file (it will be "nmap-all" by default)

Nmap ()
{
    TARGET="${1:-target.htb}";
    LOG="${2:-all}";
    TMPFILE=$(mktemp /dev/shm/XXXXXX);
    \sudo nmap -p- -n --min-rate=1000 -T4 "${TARGET}" -v | \tee -a "${TMPFILE}";
    ports=$(\cat "${TMPFILE}" | grep ^[0-9] | cut -d '/' -f 1 | tr '\n' ',' | sed s/,$//);
    \sudo nmap -n -sC -sV -v -p "${ports}" "${TARGET}" -oN "./nmap-${LOG}";
}
Reply
#10
thanks alot for the autonmap script , can it be allowed for OSCP??

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Multi-Accounting @iHzxy @Kingkevin29 @iMSuchDumb @RizkiAditia @moviesnetwork @frontmeal @araspolw @ahmedbybers @glacedgaming24 @jesxx | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [Season10] ROOT Pterodactyl pulsebreaker 56 1,696 1 hour ago
Last Post: cemoni
  CBBH Write Ups hiddenhacker 29 7,018 1 hour ago
Last Post: char0n1507
  [FREE] CPTS 12 FLAGS pulsebreaker 91 3,925 4 hours ago
Last Post: youdude
  [MEGALEAK] HackTheBox ProLabs, Fortress, Endgame - Alchemy, 250 Flags, leak htb-bot htb-bot 101 9,671 Today, 04:22 AM
Last Post: echo_party
  HTB Eloquia User and Root Flags - Insane Box 69646B 15 801 Today, 12:02 AM
Last Post: Surplus1926

Forum Jump:


 Users browsing this forum: 1 Guest(s)