-
Notifications
You must be signed in to change notification settings - Fork 0
Home
Muhammad Zahid Azmy edited this page Apr 22, 2026
·
1 revision
Get started with VIGIL in minutes! This guide will walk you through your first security assessment.
Discover all active hosts on your local network:
# Basic host discovery
python vigil.py --discover 192.168.1.0/24
# With verbose output
python vigil.py --discover 192.168.1.0/24 -v
# Save results to file
python vigil.py --discover 192.168.1.0/24 --output results.jsonScan specific hosts for open ports and services:
# Quick scan of common ports
python vigil.py -t 192.168.1.10 -p 22,80,443,3389
# Full port range scan
python vigil.py -t 192.168.1.10 -p 1-65535
# Fast scan (skip CVE checks)
python vigil.py -t 192.168.1.10 --fastPerform comprehensive security analysis:
# Full security assessment with CVE checks
python vigil.py -t 192.168.1.10 -p 1-1000 --cve-check -v
# With custom timeout for slow networks
python vigil.py -t 192.168.1.10 --timeout 2.0 -vActivate IDS monitoring mode:
# Basic monitoring
python vigil.py --vigilant -i "Ethernet"
# With custom alert threshold
python vigil.py --vigilant -i "Ethernet" --alert-threshold 5
# Custom packet filter
python vigil.py --vigilant --bpf "tcp and port 443"[+] Host Discovery Results
ββββββββββββββββ¬ββββββββββββββ¬βββββββββββββββ¬ββββββββββββββ
β IP Address β MAC Address β Vendor β Response β
ββββββββββββββββΌββββββββββββββΌβββββββββββββββΌββββββββββββββ€
β 192.168.1.1 β aa:bb:cc... β Cisco Systemsβ 2.3ms β
β 192.168.1.10 β dd:ee:ff... β Apple Inc. β 1.8ms β
ββββββββββββββββ΄ββββββββββββββ΄βββββββββββββββ΄ββββββββββββββ
[+] Port Scan Results
ββββββββββββββββ¬βββββββ¬ββββββββββββββ¬ββββββββββββββ¬ββββββββββββββββ
β Port β Stateβ Service β Version β CVE β
ββββββββββββββββΌβββββββΌββββββββββββββΌββββββββββββββΌββββββββββββββββ€
β 22 β OPEN β SSH β OpenSSH 7.4 β CVE-2018-15473β
β 80 β OPEN β HTTP β Apache 2.4 β CVE-2017-7679 β
β 443 β OPEN β HTTPS β nginx 1.18 β None β
ββββββββββββββββ΄βββββββ΄ββββββββββββββ΄ββββββββββββββ΄ββββββββββββββββ
[!] IDS Alert: SYN Flood Detected
Source: 192.168.1.100
Target: 192.168.1.10
Count: 150 connections in 10s
Threshold: 10 connections
# Complete network assessment
python vigil.py --discover 192.168.1.0/24 --save-results
python vigil.py -t 192.168.1.10 -p 1-1000 --cve-check -v
python vigil.py -t 192.168.1.20 -p 1-1000 --cve-check -v# Focus on web services
python vigil.py -t example.com -p 80,443,8080,8443 --cve-check -vv# Continuous monitoring
python vigil.py --vigilant -i "Ethernet" --alert-threshold 10 --log-file security.log# Fast assessment for large networks
python vigil.py -t 192.168.1.0/24 --fast --threads 200# Increase thread count
python vigil.py -t target.com --threads 200
# Use fast mode
python vigil.py -t target.com --fast
# Scan specific port ranges
python vigil.py -t target.com -p 21,22,23,25,53,80,110,143,443,993,995# Increase timeout
python vigil.py -t target.com --timeout 3.0
# Reduce threads
python vigil.py -t target.com --threads 50# Enable verbose mode
python vigil.py -t target.com -vv
# Enable all checks
python vigil.py -t target.com --cve-check --no-fast# Monitor only HTTPS traffic
python vigil.py --vigilant --bpf "tcp and port 443"
# Monitor specific subnet
python vigil.py --vigilant --bpf "net 192.168.1.0/24"
# Monitor specific protocols
python vigil.py --vigilant --bpf "icmp or udp"# JSON output
python vigil.py -t target.com --output results.json --format json
# CSV output
python vigil.py -t target.com --output results.csv --format csv
# XML output
python vigil.py -t target.com --output results.xml --format xml- Open SSH with old versions: Often vulnerable to brute force
- HTTP without HTTPS: Potential data interception
- Default ports: May indicate default configurations
- Multiple web services: Potential attack surface
- Unexpected open ports: May indicate malware or backdoors
- Services on non-standard ports: Potential evasion techniques
- Multiple versions of same service: Configuration issues
- Get Permission: Always have written authorization
- Test Environment: Start with non-production systems
- Network Impact: Be aware of scanning impact
- Monitor Performance: Watch for network degradation
- Log Everything: Keep detailed scan logs
- Be Responsible: Don't exploit found vulnerabilities
- Review Results: Analyze findings carefully
- Prioritize Issues: Focus on critical vulnerabilities
- Document Everything: Create security assessment reports
If you need assistance:
- Check the User Guide for detailed documentation
- Review Troubleshooting for common issues
- Visit GitHub Discussions for community support
- Open an Issue for bugs or feature requests
- Read the complete User Guide
- Check the Command Reference
- Learn about Configuration options
Ready to become a security expert? Start exploring VIGIL's advanced features!
Last updated: 2025-04-22