Skip to content
This repository has been archived by the owner on Mar 26, 2023. It is now read-only.

Adds an nmap and service detection features #224

Closed
wants to merge 4 commits into from
Closed

Adds an nmap and service detection features #224

wants to merge 4 commits into from

Conversation

JustinTimperio
Copy link
Contributor

@JustinTimperio JustinTimperio commented Mar 2, 2021

At this point, this is a fairly experimental feature. Currently, I have been unable to get this to compile on windows so I needed to rework the file structure a little to make the feature os specific. I still need to submit an issue to the upstream package about windows support but it may just be an issue on my end. Overall I think this is still worth adding because of how powerful the feature actually is.

Here is what the output looks like (censored):

Select client to interact with:
 ❯ 0    vBHv3Vc5awx39ivu        vBHv3Vc5awx39ivu
[vBHv3Vc5awx39ivu] /home/justin/Repos/GoLang/ToRat$ netscan
[vBHv3Vc5awx39ivu] This will take up to 10 minutes!
[vBHv3Vc5awx39ivu] [+] Nmap finished
Nmap on 192.168.1.0/24: 30 hosts up scanned in 204.750000 seconds
|----Host: "192.168.1.1"
|    |-Port 53/tcp open domain  
|    |-Port 8443/tcp open http  
|
|----Host: "192.168.1.xxx"
|    |-Port 22/tcp open ssh  protocol 2.0
|
|----Host: "192.168.1.xxx"
|    |-Port 80/tcp open http  
|
|----Host: "192.168.1.xxx"
|    |-Port 22/tcp open ssh  protocol 2.0
|
|----Host: "192.168.1.xxx"
|    |-Port 22/tcp open ssh  protocol 2.0
|    |-Port 53/tcp open domain  
|    |-Port 80/tcp open http  
|
|----Host: "192.168.1.xxx"
|    |-Port 22/tcp open ssh  Ubuntu Linux; protocol 2.0
|    |-Port 53/tcp open domain  
|    |-Port 80/tcp open http  
|
|----Host: "192.168.1.xxx"
|    |-Port 22/tcp open ssh  protocol 2.0
|    |-Port 7777/tcp open cbt  
|
|----Host: "192.168.1.xxx"
|    |-Port 80/tcp open http  
|
|----Host: "192.168.1.xxx"
|    |-Port 22/tcp open ssh  protocol 2.0
|    |-Port 5432/tcp open postgresql  
|
|----Host: "192.168.1.xxx"
|    |-Port 22/tcp open ssh  protocol 2.0
|    |-Port 8000/tcp open http  
|
|----Host: "192.168.1.xxx"
|    |-Port 22/tcp open ssh  protocol 2.0
|    |-Port 80/tcp open http  
|    |-Port 443/tcp open https  
|
|----Host: "192.168.1.xxx"
|    |-Port 22/tcp open ssh  protocol 2.0
|    |-Port 80/tcp open http  
|    |-Port 111/tcp open rpcbind  RPC #100000
|
|----Host: "192.168.1.xxx"
|    |-Port 80/tcp open http  
|
|----Host: "192.168.1.xxx"
|    |-Port 80/tcp open http printer KS_HTTP 1.0
|    |-Port 139/tcp open microsoft-ds printer workgroup: WORKGROUP
|    |-Port 515/tcp open printer  
|    |-Port 631/tcp open ipp  
|
|----Host: "192.168.1.xxx"
|    |-Port 22/tcp open ssh  FreeBSD 20180909; protocol 2.0
|    |-Port 3000/tcp open ppp  
|
|----Host: "192.168.1.xxx"
|    |-Port 80/tcp open http  
|
|----Host: "192.168.1.xxx"
|    |-Port 22/tcp open ssh  Ubuntu Linux; protocol 2.0
|    |-Port 3000/tcp open ppp  
|
|----Host: "192.168.1.xxx"
|    |-Port 22/tcp open ssh  FreeBSD 20180909; protocol 2.0
|    |-Port 80/tcp open http  
|    |-Port 443/tcp open http  
|
|----Host: "192.168.1.xxx"
|    |-Port 22/tcp open ssh  protocol 2.0
|    |-Port 9000/tcp open cslistener  
|
|----Host: "192.168.1.xxx"
|    |-Port 22/tcp open ssh  Ubuntu Linux; protocol 2.0
|
|----Host: "192.168.1.xxx"
|    |-Port 53/tcp filtered domain  
|    |-Port 143/tcp filtered imap  
|    |-Port 264/tcp filtered bgmp  
|    |-Port 464/tcp filtered kpasswd5  
|    |-Port 497/tcp filtered retrospect  
|    |-Port 1087/tcp filtered cplscrambler-in  
|    |-Port 2006/tcp filtered invokator  
|    |-Port 3260/tcp filtered iscsi  
|    |-Port 3300/tcp filtered ceph  
|    |-Port 3828/tcp filtered neteh  
|    |-Port 5633/tcp filtered beorl  
|    |-Port 6789/tcp filtered ibm-db2-admin  
|    |-Port 6881/tcp filtered bittorrent-tracker  
|    |-Port 6969/tcp filtered acmsoda  
|    |-Port 7938/tcp filtered lgtomapper  
|    |-Port 9010/tcp filtered sdr  
|    |-Port 10004/tcp filtered emcrmirccd  
|    |-Port 16080/tcp filtered osxwebadmin  
|    |-Port 19315/tcp filtered keyshadow  
|    |-Port 27356/tcp filtered unknown  
|    |-Port 55600/tcp filtered unknown  
|
|----Host: "192.168.1.xxx"
|    |-Port 22/tcp open ssh  protocol 2.0
|    |-Port 80/tcp open http  
|    |-Port 443/tcp open https  
|
|----Host: "192.168.1.xxx"
|    |-Port 22/tcp open ssh  protocol 2.0
|
|----Host: "192.168.1.xxx"
|    |-Port 22/tcp open ssh  Ubuntu Linux; protocol 2.0
|    |-Port 9091/tcp open http  unauthorized
|
|----Host: "192.168.1.xxx"
|    |-Port 22/tcp open ssh  Ubuntu Linux; protocol 2.0
|    |-Port 111/tcp open rpcbind  RPC #100000
|    |-Port 2049/tcp open nfs_acl  RPC #100227
|
|----Host: "192.168.1.xxx"
|    |-Port 22/tcp open ssh  protocol 2.0
|    |-Port 5432/tcp open postgresql  
|
|----Host: "192.168.1.xxx"
|    |-Port 22/tcp open ssh  protocol 2.0
|
[vBHv3Vc5awx39ivu] /home/justin/Repos/GoLang/ToRat$  

Doing a quick rebase with upstream
@lu4p
Copy link
Owner

lu4p commented Mar 2, 2021

@JustinTimperio You know that the client PC needs to have nmap installed for your PR to work? Your dependency just instructs the real nmap program, therefore this PR doesn't work.

@JustinTimperio
Copy link
Contributor Author

@lu4p I honestly hadn't tested this yet. For me, this was a proof of concept to see if it was possible to get this working. Your right, this is mostly useless if it can't be embedded.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants