Nmap automation script useful for beginner in recon process of HTB Boxes
by 4ung - Saturday February 3, 2024 at 10:09 AM
#1
I had successfully created the nmap automation script by python language to recon the box which will be useful in pentesting practice.

You may can check.
nmap_automation.py

Work Flow:
1) Nmap port scan on the target host
2) Filter opened ports
3) service, os, scripts scan on the open ports
4) Print the results in the terminal and saved in the files.

Preview Video of Usage
Reply
#2
that's really cool, does it scan UDP ports as well?
Reply
#3
(Feb 03, 2024, 10:18 AM)alph4byt33 Wrote: that's really cool, does it scan UDP ports as well?

Thanks for asking.
For sure, we can edit to scan including udp ports by adding -u flag.

I'll edit it for better.
Reply
#4
alright that's awesome, thanks a lot
Reply
#5
Thisis so cool, I will try to make one but that automated the whole recon

Thanks for posting, I downloading now

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching.
Reply
#6
thanks for sharing
Reply
#7
Okay, that's great, many thanks.
poly track
Reply
#8
great bro! thanks, keep improving, your thread is very useful
nice script

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Scraping | Contact us via https://breachforums.rs/misc.php?action=help&hid=27 if you feel this is incorrect.
Reply
#9
hello,

i suggest you to add the "-n" option to avoid DNS resolution

Here is the bash function that i use.
The first arg is the @IP of the target (target.htb by default is the common name i use) and the second arg is the name of the log file (it will be "nmap-all" by default)

Nmap ()
{
    TARGET="${1:-target.htb}";
    LOG="${2:-all}";
    TMPFILE=$(mktemp /dev/shm/XXXXXX);
    \sudo nmap -p- -n --min-rate=1000 -T4 "${TARGET}" -v | \tee -a "${TMPFILE}";
    ports=$(\cat "${TMPFILE}" | grep ^[0-9] | cut -d '/' -f 1 | tr '\n' ',' | sed s/,$//);
    \sudo nmap -n -sC -sV -v -p "${ports}" "${TARGET}" -oN "./nmap-${LOG}";
}
Reply
#10
thanks alot for the autonmap script , can it be allowed for OSCP??

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Multi-Accounting @iHzxy @Kingkevin29 @iMSuchDumb @RizkiAditia @moviesnetwork @frontmeal @araspolw @ahmedbybers @glacedgaming24 @jesxx | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  rev_dudidudida cavour13 2 410 2 minutes ago
Last Post: char0n1507
  MCTRA AWS Flag wdah3lL 1 530 4 hours ago
Last Post: uuiuu
Heart [FREE] HackTheBox All Cheatsheets Tamarisk 27 1,654 7 hours ago
Last Post: Haier
  [FREE] CPTS 12 FLAGS pulsebreaker 93 4,112 7 hours ago
Last Post: Haier
  [Season10] ROOT Pterodactyl pulsebreaker 57 1,842 Today, 02:13 AM
Last Post: knoflins

Forum Jump:


 Users browsing this forum: 1 Guest(s)