OWASP Nettacker-自動滲透測試攻擊框架

OWASP Nettacker是一種Python語言的開源軟件,可讓您自動進行滲透測試和自動信息收集。該軟件可以在Python下的Windows / Linux / OSX上運行。

OWASP Nettacker-自動滲透測試攻擊框架

OWASP Nettacker項目旨在自動收集信息,進行漏洞掃描,並最終為網絡生成報告,包括服務,錯誤,漏洞,錯誤配置和其他信息。

該軟件將利用TCP SYN,ACK,ICMP和許多其他協議來檢測和繞過防火牆/ IDS / IPS設備。通過在OWASP Nettacker中利用獨特的方法來發現受保護的服務和設備,如SCADA。與其他掃描儀相比,這將成為競爭優勢,使其成為最佳選擇之一。


______ __ _____ _____
/ __ \\ \\ / /\\ / ____| __ \\
| | | \\ \\ /\\ / / \\ | (___ | |__) |
| | | |\\ \\/ \\/ / /\\ \\ \\___ \\| ___/
| |__| | \\ /\\ / ____ \\ ____) | | Version 0.0.1
\\____/ \\/ \\/_/ \\_\\_____/|_| SAME
_ _ _ _ _
| \\ | | | | | | | |
github.com/viraintel | \\| | ___| |_| |_ __ _ ___| | _____ _ __
owasp.org | . ` |/ _ \\ __| __/ _` |/ __| |/ / _ \\ '__|
viraintel.com | |\\ | __/ |_| || (_| | (__| < __/ |
|_| \\_|\\___|\\__|\\__\\__,_|\\___|_|\\_\\___|_|usage: Nettacker [-L LANGUAGE] [-v VERBOSE_LEVEL] [-V] [-c] [-o LOG_IN_FILE]
[--graph GRAPH_FLAG] [-h] [-W] [--profile PROFILE]
[-i TARGETS] [-l TARGETS_LIST] [-m SCAN_METHOD]
[-x EXCLUDE_METHOD] [-u USERS] [-U USERS_LIST] [-p PASSWDS]
[-P PASSWDS_LIST] [-g PORTS] [-T TIMEOUT_SEC] [-w TIME_SLEEP]
[-r] [-s] [-t THREAD_NUMBER] [-M THREAD_NUMBER_HOST]
[-R SOCKS_PROXY] [--retries RETRIES] [--ping-before-scan]
[--method-args METHODS_ARGS] [--method-args-list]
[--start-api] [--api-host API_HOST] [--api-port API_PORT]
[--api-debug-mode] [--api-access-key API_ACCESS_KEY]
[--api-client-white-list]
[--api-client-white-list-ips API_CLIENT_WHITE_LIST_IPS]
[--api-access-log]
[--api-access-log-filename API_ACCESS_LOG_FILENAME]Engine:
Engine input options
-L LANGUAGE, --language LANGUAGE
select a language ['el', 'fr', 'en', 'nl', 'ps', 'tr',
'de', 'ko', 'it', 'ja', 'fa', 'hy', 'ar', 'zh-cn',
'vi', 'ru', 'hi', 'ur', 'id', 'es']
-v VERBOSE_LEVEL, --verbose VERBOSE_LEVEL

verbose mode level (0-5) (default 0)
-V, --version show software version
-c, --update check for update
-o LOG_IN_FILE, --output LOG_IN_FILE
save all logs in file (results.txt, results.html,
results.json)
--graph GRAPH_FLAG build a graph of all activities and information, you
must use HTML output. available graphs:
['d3_tree_v1_graph', 'd3_tree_v2_graph',
'jit_circle_v1_graph']
-h, --help Show Nettacker Help Menu
-W, --wizard start wizard mode
--profile PROFILE select profile ['vulnerabilities',
'information_gathering', 'all']Target:
Target input options
-i TARGETS, --targets TARGETS
target(s) list, separate with ","
-l TARGETS_LIST, --targets-list TARGETS_LIST
read target(s) from fileMethod:
Scan method options
-m SCAN_METHOD, --method SCAN_METHOD
choose scan method ['ftp_brute', 'smtp_brute',
'ssh_brute', 'dir_scan', 'subdomain_scan',
'tcp_connect_port_scan',
'viewdns_reverse_ip_lookup_scan', 'heartbleed_vuln',
'all']
-x EXCLUDE_METHOD, --exclude EXCLUDE_METHOD
choose scan method to exclude ['ftp_brute',
'smtp_brute', 'ssh_brute', 'dir_scan',
'subdomain_scan', 'tcp_connect_port_scan',
'viewdns_reverse_ip_lookup_scan', 'heartbleed_vuln']
-u USERS, --usernames USERS
username(s) list, separate with ","
-U USERS_LIST, --users-list USERS_LIST
read username(s) from file
-p PASSWDS, --passwords PASSWDS
password(s) list, separate with ","
-P PASSWDS_LIST, --passwords-list PASSWDS_LIST
read password(s) from file
-g PORTS, --ports PORTS
port(s) list, separate with ","
-T TIMEOUT_SEC, --timeout TIMEOUT_SEC
read passwords(s) from file
-w TIME_SLEEP, --time-sleep TIME_SLEEP
time to sleep between each request
-r, --range scan all IPs in the range
-s, --sub-domains find and scan subdomains
-t THREAD_NUMBER, --thread-connection THREAD_NUMBER
thread numbers for connections to a host
-M THREAD_NUMBER_HOST, --thread-hostscan THREAD_NUMBER_HOST

thread numbers for scan hosts
-R SOCKS_PROXY, --socks-proxy SOCKS_PROXY
outgoing connections proxy (socks). example socks5:
127.0.0.1:9050, socks://127.0.0.1:9050,
socks5://127.0.0.1:9050 or socks4:
socks4://127.0.0.1:9050, authentication:
socks://username:[email protected],
socks4://username:[email protected],
socks5://username:[email protected]
--retries RETRIES Retries when the connection timeout (default 3)
--ping-before-scan ping before scan the host
--method-args METHODS_ARGS
enter methods inputs, example: "ftp_brute_users=test,a
dmin&ftp_brute_passwds=read_from_file:/tmp/pass.txt&ft
p_brute_port=21"
--method-args-list list all methods argsAPI:
API options
--start-api start the API service
--api-host API_HOST API host address
--api-port API_PORT API port number
--api-debug-mode API debug mode
--api-access-key API_ACCESS_KEY
API access key
--api-client-white-list
just allow white list hosts to connect to the API
--api-client-white-list-ips API_CLIENT_WHITE_LIST_IPS
define white list hosts, separate with "," (examples:
127.0.0.1, 192.168.0.1/24, 10.0.0.1-10.0.0.255)
--api-access-log generate API access log
--api-access-log-filename API_ACCESS_LOG_FILENAME
API access log filenamePlease read license and agreements https://github.com/viraintel/OWASP-Nettacker

特徵:

  • 物聯網掃描儀

  • Python多線程和多進程網絡信息收集漏洞掃描器

  • 服務和設備檢測(SCADA,受限區域,路由器,HTTP服務器,登錄和身份驗證,無索引HTTP,Paradox系統,攝像機,防火牆,UTM,WebMail,VPN,RDP,SSH,FTP,TELNET服務,代理服務器和許多瞻博網絡,思科,交換機等設備......)

  • 網絡服務分析

  • 服務蠻力測試

  • 服務漏洞測試

  • HTTP / HTTPS抓取,模糊,信息收集和...

  • HTML和文本輸出

該項目目前處於研究和開發階段,大部分結果/代碼尚未發佈。

GitHub主頁:https://github.com/viraintel/OWASP-Nettacker


分享到:


相關文章: