SCAN YOUR WHOLE LAN (LOCAL AREA NETWORK) WITH ONE COMMAND

Views:
 
     
 

Presentation Description

Imagine scanning the LAN (Local Area Network) network with one command line. Now coming to this tool Null scan, it’s a Network scanning tool. We can use this tool for scanning the network and websites. This tool is built-in python language and this tool can be used in first stage of penetration testing.

Comments

Presentation Transcript

slide 1:

SCAN YOUR WHOLE LAN LOCAL AREA NETWORK WITH ONE COMMAND INTRODUCTION Imagine scanning the LAN Local Area Network network with one command line. Now coming to this tool Null scan it’s a Network scanning tool. We can use this tool for scanning the network and websites. This tool is built-in python language and this tool can be used in first stage of penetration testing. ENVIRONMENT  OS: Kali Linux 2019.3 64 bits  Kernel version: 5.2.0 INSTALLATION STEPS  Type this command to clone the project.  git clone https://github.com/noptrix/nullscan rootkali:/home/iicybersecurity git clone https://github.com/noptrix/nullscan Cloning into nullscan... remote: Enumerating objects: 283 done. remote: Counting objects: 100 283/283 done. remote: Compressing objects: 100 159/159 done. remote: Total 283 delta 133 reused 270 delta 120 pack-reused 0 Receiving objects: 100 283/283 1.16 MiB | 131.00 KiB/s done. Resolving deltas: 100 133/133 done.  Use the cd command to enter into the nullscan directory. rootkali:/home/iicybersecurity cd nullscan/ rootkali:/home/iicybersecurity/nullscan  Now install the requirements by typing this command pip install -r docs/requirements.txt

slide 2:

Requirements  Use this command to give the permission to setup.sh file o chmod +x setup.sh  Now use this command to install the tool o ./setup.sh install Tools Install  Next use this command to find the help options. o nullscan -H

slide 3:

Help Fig 1

slide 4:

Help Fig 2  Now use this command to scan your LAN Network by specifying the range.  nullscan -t ‘192.168.1.0/24’ -i ‘tcpsshhttp’ -r -I ‘hydra_sshcrack_http_auth’ o -t scan the network by using Nmap tool o -i include modes o -I include tools o -r generate HTML Report Network Scan

slide 5:

 Here scanning is completed using the Nmap tool TCP modes and we can see the results in reports directory.  Use the ls command to view the directory. Report Files  This tool scans whole network range we specified and displays all open ports on all IP’s.  In the above picture we see results results.gnmap results.nmap and results.xml  In the results.gnmap show all IPs in the LAN with their status and open ports.

slide 6:

Network Results URL MODE  In this tool we have URL mode.  For testing we will run DVWA as victim web server: o For downloading DVWA iso go to: https://www.vulnhub.com/entry/damn-vulnerable-web- application-dvwa-10743/

slide 7:

o After downloading iso open iso in virtual box or vmware workstation. Then start iso. o For getting DVWA ip type ifconfig In our case IP was 192.168.1.108  Now we will enter the target URL in NullScan. This mode scans the website and generates a report.  Use this command to scan website running in DVWA.  nullscan -u ‘http://192.168.1.108/’ -i ‘tcpsshhttp’ -r -I ‘hydra_sshcrack_http_auth’ Web Mode Scan  Use ls command to view the report. Report Files  It also generates an HTML report. There we can view the complete results.

slide 8:

Web Mode Results Fig 1  Here we see the complete web.default results with different modes.  Now we show some unique information about target web site

slide 10:

Web Mode Results Fig 2 In the above picture we see some unique results of port status services about the target. CONCLUSION This tool can scan Complete LAN network by using single command. This tool is quite useful for all IT Admin to quickly scan their network for vulnerabilities. We can execute this tool in less time with more results. Contact https://www.securitynewspaper.com/ MEXICO 538 Homero 303 Chapultepec Morales Mexico D.F Distrito Federal 11570 INDIA Fifth Floor HB Twin Tower Netaji Subhash Place Delhi NCR 110034

authorStream Live Help