10 C
London
Sunday, December 17, 2023

Highly effective And Versatile Port Scanning Software With Shodan




NetworkSherlock is a strong and versatile port scanning software designed for community safety professionals and penetration testers. With its superior capabilities, NetworkSherlock can effectively scan IP ranges, CIDR blocks, and a number of targets. It stands out with its detailed banner grabbing capabilities throughout numerous protocols and integration with Shodan, the world’s premier service for scanning and analyzing internet-connected gadgets. This Shodan integration permits NetworkSherlock to supply enhanced scanning capabilities, giving customers deeper insights into community vulnerabilities and potential threats. By combining native port scanning with Shodan’s in depth database, NetworkSherlock presents a complete software for figuring out and analyzing community safety points.

Options

Set up

NetworkSherlock requires Python 3.6 or later.

  1. Clone the repository:
    git clone https://github.com/HalilDeniz/NetworkSherlock.git
  2. Set up the required packages:
    pip set up -r necessities.txt

Configuration

Replace the networksherlock.cfg file together with your Shodan API key:

[SHODAN]
api_key = YOUR_SHODAN_API_KEY

Utilization

Port Scan Software positional arguments: goal Goal IP handle(es), vary, or CIDR (e.g., 192.168.1.1, 192.168.1.1-192.168.1.5, 192.168.1.0/24) choices: -h, –help present this assist message and exit -p PORTS, –ports PORTS Ports to scan (e.g. 1-1024, 21,22,80, or 80) -t THREADS, –threads THREADS Variety of threads to make use of -P {tcp,udp}, –protocol {tcp,udp} Protocol to make use of for scanning -V, –version-info Used to get model info -s SAVE_RESULTS, –save-results SAVE_RESULTS File to save lots of scan outcomes -c, –ping-check Carry out ping verify earlier than scanning –use-shodan Allow Shodan integration for added info ” dir=”auto”>

python3 networksherlock.py --help
utilization: networksherlock.py [-h] [-p PORTS] [-t THREADS] [-P {tcp,udp}] [-V] [-s SAVE_RESULTS] [-c] goal

NetworkSherlock: Port Scan Software

positional arguments:
goal Goal IP handle(es), vary, or CIDR (e.g., 192.168.1.1, 192.168.1.1-192.168.1.5,
192.168.1.0/24)

choices:
-h, --help present this assist message and exit
-p PORTS, --ports PORTS
Ports to scan (e.g. 1-1024, 21,22,80, or 80)
-t THREADS, --threads THREADS
Variety of threads to make use of
-P {tcp,udp}, --protocol {tcp,udp}
Protocol to make use of for scanning
-V, --version-info Used to get model info
-s SAVE_RESULTS, --save-results SAVE_RESULTS
File to save lots of scan outcomes
-c, --ping-check Carry out ping verify earlier than scanning
--use-shodan Allow Shodan integration for added info

Fundamental Parameters

  • goal: The goal IP handle(es), IP vary, or CIDR block to scan.
  • -p, --ports: Ports to scan (e.g., 1-1000, 22,80,443).
  • -t, --threads: Variety of threads to make use of.
  • -P, --protocol: Protocol to make use of for scanning (tcp or udp).
  • -V, --version-info: Get hold of model info throughout banner grabbing.
  • -s, --save-results: Save outcomes to the desired file.
  • -c, --ping-check: Carry out a ping verify earlier than scanning.
  • --use-shodan: Allow Shodan integration.

Instance Utilization

Fundamental Port Scan

Scan a single IP handle on default ports:

python networksherlock.py 192.168.1.1

Customized Port Vary

Scan an IP handle with a customized vary of ports:

python networksherlock.py 192.168.1.1 -p 1-1024

A number of IPs and Port Specification

Scan a number of IP addresses on particular ports:

python networksherlock.py 192.168.1.1,192.168.1.2 -p 22,80,443

CIDR Block Scan

Scan a whole subnet utilizing CIDR notation:

python networksherlock.py 192.168.1.0/24 -p 80

Utilizing Multi-Threading

Carry out a scan utilizing a number of threads for quicker execution:

python networksherlock.py 192.168.1.1-192.168.1.5 -p 1-1024 -t 20

Scanning with Protocol Choice

Scan utilizing a particular protocol (TCP or UDP):

python networksherlock.py 192.168.1.1 -p 53 -P udp

Scan with Shodan

python networksherlock.py 192.168.1.1 --use-shodan

Scan A number of Targets with Shodan

python networksherlock.py 192.168.1.1,192.168.1.2 -p 22,80,443 -V --use-shodan

Banner Grabbing and Save Outcomes

Carry out an in depth scan with banner grabbing and save outcomes to a file:

python networksherlock.py 192.168.1.1 -p 1-1000 -V -s outcomes.txt

Ping Verify Earlier than Scanning

Scan an IP vary after performing a ping verify:

python networksherlock.py 10.0.0.1-10.0.0.255 -c

OUTPUT EXAMPLE

$ python3 networksherlock.py 10.0.2.12 -t 25 -V -p 21-6000 -t 25
********************************************
Scanning goal: 10.0.2.12
Scanning IP : 10.0.2.12
Ports : 21-6000
Threads : 25
Protocol : tcp
---------------------------------------------
Port Standing Service VERSION
22 /tcp open ssh SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1
21 /tcp open telnet 220 (vsFTPd 2.3.4)
80 /tcp open http HTTP/1.1 200 OK
139 /tcp open netbios-ssn %SMBr
25 /tcp open smtp 220 metasploitable.localdomain ESMTP Postfix (Ubuntu)
23 /tcp open smtp #' #'
445 /tcp open microsoft-ds %SMBr
514 /tcp open shell
512 /tcp open exec The place are you?
1524/tcp open ingreslock ro ot@metasploitable:/#
2121/tcp open iprop 220 ProFTPD 1.3.1 Server (Debian) [::ffff:10.0.2.12]
3306/tcp open mysql >
5900/tcp open unknown RFB 003.003
53 /tcp open area
---------------------------------------------

OutPut Instance

$ python3 networksherlock.py 10.0.2.0/24 -t 10 -V -p 21-1000
********************************************
Scanning goal: 10.0.2.1
Scanning IP : 10.0.2.1
Ports : 21-1000
Threads : 10
Protocol : tcp
---------------------------------------------
Port Standing Service VERSION
53 /tcp open area
********************************************
Scanning goal: 10.0.2.2
Scanning IP : 10.0.2.2
Ports : 21-1000
Threads : 10
Protocol : tcp
---------------------------------------------
Port Standing Service VERSION
445 /tcp open microsoft-ds
135 /tcp open epmap
********************************************
Scanning goal: 10.0.2.12
Scanning IP : 10.0.2.12
Ports : 21- 1000
Threads : 10
Protocol : tcp
---------------------------------------------
Port Standing Service VERSION
21 /tcp open ftp 220 (vsFTPd 2.3.4)
22 /tcp open ssh SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1
23 /tcp open telnet #'
80 /tcp open http HTTP/1.1 200 OK
53 /tcp open kpasswd 464/udpcp
445 /tcp open area %SMBr
3306/tcp open mysql >
********************************************
Scanning goal: 10.0.2.20
Scanning IP : 10.0.2.20
Ports : 21-1000
Threads : 10
Protocol : tcp
---------------------------------------------
Port Standing Service VERSION
22 /tcp open ssh SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.9

Contributing

Contributions are welcome! To contribute to NetworkSherlock, observe these steps:

  1. Fork the repository.
  2. Create a brand new department to your function or bug repair.
  3. Make your adjustments and commit them.
  4. Push your adjustments to your forked repository.
  5. Open a pull request in the primary repository.

Contact



Latest news
Related news

LEAVE A REPLY

Please enter your comment!
Please enter your name here