NetworkSherlock is a strong and versatile port scanning software designed for community safety professionals and penetration testers. With its superior capabilities, NetworkSherlock can effectively scan IP ranges, CIDR blocks, and a number of targets. It stands out with its detailed banner grabbing capabilities throughout numerous protocols and integration with Shodan, the world’s premier service for scanning and analyzing internet-connected gadgets. This Shodan integration permits NetworkSherlock to supply enhanced scanning capabilities, giving customers deeper insights into community vulnerabilities and potential threats. By combining native port scanning with Shodan’s in depth database, NetworkSherlock presents a complete software for figuring out and analyzing community safety points.
Options
- Scans a number of IPs, IP ranges, and CIDR blocks.
- Helps port scanning over TCP and UDP protocols.
- Detailed banner grabbing function.
- Ping verify for figuring out reachable targets.
- Multi-threading assist for quick scanning operations.
- Possibility to save lots of scan outcomes to a file.
- Supplies detailed model info.
- Colourful console output for higher readability.
- Shodan integration for enhanced scanning capabilities.
- Configuration file assist for Shodan API key.
Set up
NetworkSherlock requires Python 3.6 or later.
- Clone the repository:
git clone https://github.com/HalilDeniz/NetworkSherlock.git
- Set up the required packages:
pip set up -r necessities.txt
Configuration
Replace the networksherlock.cfg
file together with your Shodan API key:
[SHODAN]
api_key = YOUR_SHODAN_API_KEY
Utilization
python3 networksherlock.py --help
utilization: networksherlock.py [-h] [-p PORTS] [-t THREADS] [-P {tcp,udp}] [-V] [-s SAVE_RESULTS] [-c] goalNetworkSherlock: Port Scan Software
positional arguments:
goal Goal IP handle(es), vary, or CIDR (e.g., 192.168.1.1, 192.168.1.1-192.168.1.5,
192.168.1.0/24)
choices:
-h, --help present this assist message and exit
-p PORTS, --ports PORTS
Ports to scan (e.g. 1-1024, 21,22,80, or 80)
-t THREADS, --threads THREADS
Variety of threads to make use of
-P {tcp,udp}, --protocol {tcp,udp}
Protocol to make use of for scanning
-V, --version-info Used to get model info
-s SAVE_RESULTS, --save-results SAVE_RESULTS
File to save lots of scan outcomes
-c, --ping-check Carry out ping verify earlier than scanning
--use-shodan Allow Shodan integration for added info
Fundamental Parameters
goal
: The goal IP handle(es), IP vary, or CIDR block to scan.-p
,--ports
: Ports to scan (e.g., 1-1000, 22,80,443).-t
,--threads
: Variety of threads to make use of.-P
,--protocol
: Protocol to make use of for scanning (tcp or udp).-V
,--version-info
: Get hold of model info throughout banner grabbing.-s
,--save-results
: Save outcomes to the desired file.-c
,--ping-check
: Carry out a ping verify earlier than scanning.--use-shodan
: Allow Shodan integration.
Instance Utilization
Fundamental Port Scan
Scan a single IP handle on default ports:
python networksherlock.py 192.168.1.1
Customized Port Vary
Scan an IP handle with a customized vary of ports:
python networksherlock.py 192.168.1.1 -p 1-1024
A number of IPs and Port Specification
Scan a number of IP addresses on particular ports:
python networksherlock.py 192.168.1.1,192.168.1.2 -p 22,80,443
CIDR Block Scan
Scan a whole subnet utilizing CIDR notation:
python networksherlock.py 192.168.1.0/24 -p 80
Utilizing Multi-Threading
Carry out a scan utilizing a number of threads for quicker execution:
python networksherlock.py 192.168.1.1-192.168.1.5 -p 1-1024 -t 20
Scanning with Protocol Choice
Scan utilizing a particular protocol (TCP or UDP):
python networksherlock.py 192.168.1.1 -p 53 -P udp
Scan with Shodan
python networksherlock.py 192.168.1.1 --use-shodan
Scan A number of Targets with Shodan
python networksherlock.py 192.168.1.1,192.168.1.2 -p 22,80,443 -V --use-shodan
Banner Grabbing and Save Outcomes
Carry out an in depth scan with banner grabbing and save outcomes to a file:
python networksherlock.py 192.168.1.1 -p 1-1000 -V -s outcomes.txt
Ping Verify Earlier than Scanning
Scan an IP vary after performing a ping verify:
python networksherlock.py 10.0.0.1-10.0.0.255 -c
OUTPUT EXAMPLE
$ python3 networksherlock.py 10.0.2.12 -t 25 -V -p 21-6000 -t 25
********************************************
Scanning goal: 10.0.2.12
Scanning IP : 10.0.2.12
Ports : 21-6000
Threads : 25
Protocol : tcp
---------------------------------------------
Port Standing Service VERSION
22 /tcp open ssh SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1
21 /tcp open telnet 220 (vsFTPd 2.3.4)
80 /tcp open http HTTP/1.1 200 OK
139 /tcp open netbios-ssn %SMBr
25 /tcp open smtp 220 metasploitable.localdomain ESMTP Postfix (Ubuntu)
23 /tcp open smtp #' #'
445 /tcp open microsoft-ds %SMBr
514 /tcp open shell
512 /tcp open exec The place are you?
1524/tcp open ingreslock ro ot@metasploitable:/#
2121/tcp open iprop 220 ProFTPD 1.3.1 Server (Debian) [::ffff:10.0.2.12]
3306/tcp open mysql >
5900/tcp open unknown RFB 003.003
53 /tcp open area
---------------------------------------------
OutPut Instance
$ python3 networksherlock.py 10.0.2.0/24 -t 10 -V -p 21-1000
********************************************
Scanning goal: 10.0.2.1
Scanning IP : 10.0.2.1
Ports : 21-1000
Threads : 10
Protocol : tcp
---------------------------------------------
Port Standing Service VERSION
53 /tcp open area
********************************************
Scanning goal: 10.0.2.2
Scanning IP : 10.0.2.2
Ports : 21-1000
Threads : 10
Protocol : tcp
---------------------------------------------
Port Standing Service VERSION
445 /tcp open microsoft-ds
135 /tcp open epmap
********************************************
Scanning goal: 10.0.2.12
Scanning IP : 10.0.2.12
Ports : 21- 1000
Threads : 10
Protocol : tcp
---------------------------------------------
Port Standing Service VERSION
21 /tcp open ftp 220 (vsFTPd 2.3.4)
22 /tcp open ssh SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1
23 /tcp open telnet #'
80 /tcp open http HTTP/1.1 200 OK
53 /tcp open kpasswd 464/udpcp
445 /tcp open area %SMBr
3306/tcp open mysql >
********************************************
Scanning goal: 10.0.2.20
Scanning IP : 10.0.2.20
Ports : 21-1000
Threads : 10
Protocol : tcp
---------------------------------------------
Port Standing Service VERSION
22 /tcp open ssh SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.9
Contributing
Contributions are welcome! To contribute to NetworkSherlock, observe these steps:
- Fork the repository.
- Create a brand new department to your function or bug repair.
- Make your adjustments and commit them.
- Push your adjustments to your forked repository.
- Open a pull request in the primary repository.
Contact