Posts: 4
Threads: 1
Joined: Jan 2024
Feb 03, 2024, 10:09 AM
(This post was last modified: Feb 03, 2024, 10:10 AM by 4ung.)
I had successfully created the nmap automation script by python language to recon the box which will be useful in pentesting practice.
You may can check.
nmap_automation.py
Work Flow:
1) Nmap port scan on the target host
2) Filter opened ports
3) service, os, scripts scan on the open ports
4) Print the results in the terminal and saved in the files.
Preview Video of Usage
Posts: 129
Threads: 7
Joined: Feb 2024
that's really cool, does it scan UDP ports as well?
Posts: 4
Threads: 1
Joined: Jan 2024
(Feb 03, 2024, 10:18 AM)alph4byt33 Wrote: that's really cool, does it scan UDP ports as well?
Thanks for asking.
For sure, we can edit to scan including udp ports by adding -u flag.
I'll edit it for better.
Posts: 129
Threads: 7
Joined: Feb 2024
alright that's awesome, thanks a lot
Posts: 40
Threads: 2
Joined: Jan 2024
Feb 20, 2024, 10:17 PM
(This post was last modified: Feb 20, 2024, 10:18 PM by thing7.)
Thisis so cool, I will try to make one but that automated the whole recon
Thanks for posting, I downloading now This forum account is currently banned. Ban Length: Permanent (N/A Remaining) Ban Reason: Leeching.
Posts: 48
Threads: 5
Joined: Jan 2024
Posts: 1
Threads: 0
Joined: Mar 2024
Okay, that's great, many thanks.
poly track
Posts: 126
Threads: 16
Joined: Jun 2023
great bro! thanks, keep improving, your thread is very useful
nice script This forum account is currently banned. Ban Length: Permanent (N/A Remaining) Ban Reason: Scraping | Contact us via https://breachforums.rs/misc.php?action=help&hid=27 if you feel this is incorrect.
Posts: 47
Threads: 4
Joined: Nov 2023
hello,
i suggest you to add the "-n" option to avoid DNS resolution
Here is the bash function that i use.
The first arg is the @IP of the target (target.htb by default is the common name i use) and the second arg is the name of the log file (it will be "nmap-all" by default)
Nmap ()
{
TARGET="${1:-target.htb}";
LOG="${2:-all}";
TMPFILE=$(mktemp /dev/shm/XXXXXX);
\sudo nmap -p- -n --min-rate=1000 -T4 "${TARGET}" -v | \tee -a "${TMPFILE}";
ports=$(\cat "${TMPFILE}" | grep ^[0-9] | cut -d '/' -f 1 | tr '\n' ',' | sed s/,$//);
\sudo nmap -n -sC -sV -v -p "${ports}" "${TARGET}" -oN "./nmap-${LOG}";
}
Posts: 38
Threads: 3
Joined: Sep 2023
thanks alot for the autonmap script , can it be allowed for OSCP?? This forum account is currently banned. Ban Length: Permanent (N/A Remaining) Ban Reason: Multi-Accounting @iHzxy @Kingkevin29 @iMSuchDumb @RizkiAditia @moviesnetwork @frontmeal @araspolw @ahmedbybers @glacedgaming24 @jesxx | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
|