1 / 10

SCAN YOUR WHOLE LAN (LOCAL AREA NETWORK) WITH ONE COMMAND

Imagine scanning the LAN (Local Area Network) network with one command line. Now coming to this tool Null scan, itu2019s a Network scanning tool. We can use this tool for scanning the network and websites. This tool is built-in python language and this tool can be used in first stage of penetration testing.

Download Presentation

SCAN YOUR WHOLE LAN (LOCAL AREA NETWORK) WITH ONE COMMAND

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SCAN YOUR WHOLE LAN (LOCAL AREA NETWORK) WITH ONE COMMAND INTRODUCTION Imagine scanning the LAN (Local Area Network) network with one command line. Now coming to this tool Null scan, it’s a Network scanning tool. We can use this tool for scanning the network and websites. This tool is built-in python language and this tool can be used in first stage of penetration testing. ENVIRONMENT   OS: Kali Linux 2019.3 64 bits Kernel version: 5.2.0 INSTALLATION STEPS   Type this command to clone the project. git clone https://github.com/noptrix/nullscan root@kali:/home/iicybersecurity# git clone https://github.com/noptrix/nullscan Cloning into 'nullscan'... remote: Enumerating objects: 283, done. remote: Counting objects: 100% (283/283), done. remote: Compressing objects: 100% (159/159), done. remote: Total 283 (delta 133), reused 270 (delta 120), pack-reused 0 Receiving objects: 100% (283/283), 1.16 MiB | 131.00 KiB/s, done. Resolving deltas: 100% (133/133), done.  Use the cd command to enter into the nullscan directory. root@kali:/home/iicybersecurity# cd nullscan/ root@kali:/home/iicybersecurity/nullscan#  Now, install the requirements by typing this command pip install -r docs/requirements.txt

  2. Requirements  Use this command to give the permission to setup.sh file o chmod +x setup.sh Now use this command to install the tool o ./setup.sh install  Tools Install  Next, use this command to find the help options. o nullscan -H

  3. Help Fig 1

  4. Help Fig 2   Now, use this command to scan your LAN Network by specifying the range. nullscan -t ‘192.168.1.0/24’ -i ‘tcp=ssh,http’ -r -I ‘hydra_ssh,crack_http_auth’ o -t scan the network by using Nmap tool o -i include modes o -I include tools o -r generate HTML Report Network Scan

  5. Here scanning is completed using the Nmap tool, TCP modes and we can see the results in reports directory. Use the ls command to view the directory.  Report Files    This tool scans whole network range we specified and displays all open ports on all IP’s. In the above picture, we see results (results.gnmap, results.nmap, and results.xml) In the results.gnmap show all IPs in the LAN with their status and open ports.

  6. Network Results URL MODE   In this tool, we have URL mode. For testing, we will run DVWA as victim web server: o For downloading DVWA iso go to: https://www.vulnhub.com/entry/damn-vulnerable-web- application-dvwa-107,43/

  7. o o After downloading iso, open iso in virtual box or vmware workstation. Then start iso. For getting DVWA ip type ifconfig, In our case IP was 192.168.1.108 Now we will enter the target URL in NullScan. This mode scans the website and generates a report. Use this command to scan website running in DVWA. nullscan -u ‘http://192.168.1.108/’ -i ‘tcp=ssh,http’ -r -I ‘hydra_ssh,crack_http_auth’    Web Mode Scan  Use ls command to view the report. Report Files  It also generates an HTML report. There we can view the complete results.

  8. Web Mode Results Fig 1   Here, we see the complete web.default results with different modes. Now, we show some unique information about target web site

  9. Web Mode Results Fig 2 In the above picture we see some unique results of port status, services about the target. CONCLUSION This tool can scan Complete LAN network by using single command. This tool is quite useful for all IT Admin to quickly scan their network for vulnerabilities. We can execute this tool in less time with more results. Contact https://www.securitynewspaper.com/ MEXICO 538, Homero #303, Chapultepec Morales, Mexico D.F (Distrito Federal) 11570 INDIA Fifth Floor, HB Twin Tower Netaji Subhash Place, Delhi NCR, 110034

More Related