Skip to content

Ppamo/recon_net_tools

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Recon Net Tools

Multiple net tools over a docker's busybox image

The main idea is to create a set of tools to be easily copied and started on a limited/small machine.


List of tools:


ag:

Is a text search tool, like grep but faster.

In the next examples we will use it to search "text" in the files in the current folder, by default recursively, then it searcht"text" in the current folder, recursivelly, only in files with ".txt" extention:

Usage:

ag text
ag -G .txt text

Docker usage:

docker run -t --rm -v $PWD:/mnt ppamo/nettools sh -c "ag text"
docker run -t --rm -v $PWD:/mnt ppamo/nettools sh -c "ag -G .txt text"

Checks if the remote secure server is protected for CVE-2014-0160 vulnerability, also known as Heartbleed Bug.

In the next example we will check the github web server:

Usage:

heartbleeder github.com:443

Docker usage:

docker run -t --rm --network host ppamo/nettools sh -c "heartbleeder github.com:443"

Lists the ciphers supported by the remote host.

The next example will list the ciphers supported by github.com secure web server:

Usage:

lsciphers github.com:443

Docker usage:

docker run -ti --rm --network host ppamo/nettools sh -c "lsciphers github.com:443"

Is a utility which reads and writes data across networks from command line.

The next example will read the output for a web server request:

Usage:

printf "GET / HTTP/1.0\r\n\r\n" | nc google.com 80

Docker usage:

docker run -ti --rm --network host ppamo/nettools sh -c 'printf "GET / HTTP/1.0\r\n\r\n" | nc google.com 80'

Is the most popular network mapper for discovery and security auditing.

The next example will scan for open ports at scanme.nmap.org:

Usage:

nmap -v scanme.nmap.org

Docker usage:

docker run -ti --rm --network host ppamo/nettools sh -c "nmap -v scanme.nmap.org"

Is a tool for network packet generation, response analysis and response time measurement.

A representative Nping execution sending packages at two different hosts:

Usage:

nping -c 1 --tcp scanme.nmap.org google.com

Docker usage:

docker run -ti --rm --network host ppamo/nettools sh -c "nping -c 1 --tcp scanme.nmap.org google.com"

go_dnsGetA:

A DNS resolver

Usage:

go_dnsGetA github.com

Docker usage:

docker run -ti --rm --network host ppamo/nettools sh -c "go_dnsGetA github.com"

go_lookupIP:

An IP lookup tool

Usage:

go_lookupIP 8.8.8.8

Docker usage:

docker run -ti --rm --network host ppamo/nettools sh -c "go_lookupIP 8.8.8.8"

go_getServName:

A hostname lookup tool

Usage:

go_getServName github.com

Docker usage:

docker run -ti --rm --network host ppamo/nettools sh -c "go_getServName github.com"

go_sshCrack:

A ssh server cracker

Usage:

go_sshCrack IPList userDic passDic

Docker usage:

docker run -ti --rm --network host ppamo/nettools sh -c "go_sshCrack IPList userDic passDic"

go_bruteHtmlForm:

A force brute tool for web forms

Usage:

go_bruteHtmlForm passwords.txt https://test.com/login admin username password

Docker usage:

docker run -ti --rm --network host ppamo/nettools sh -c "go_bruteHtmlForm passwords.txt https://test.com/login admin username password"

go_fileTimestamp:

A tool to reset a file's timestamp

Usage:

go_fileTimestamp test.txt

Docker usage:

docker run -ti --rm --network host ppamo/nettools sh -c "go_fileTimestamp test.txt"

About

multiple net tools over a docker's busybox image

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published