New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add a GTP-U echo scanner module #11781
Conversation
Travis reports the build failed, but then the details state that the repository couldn't be found. 🤔 |
Tests have been broken for a week or so. Edit: Tests have now been fixed in #11782. |
|
||
register_options([ | ||
OptEnum.new('VERSION', [ true, 'The GTP version to use', '1', ['1', '2'] ]), | ||
Opt::RPORT(2152) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Note, by setting this to 2123 you also get a GTP-C scanner.
Release NotesThe scanner/gprs/gtp_echo auxiliary module has been added to the framework. This adds a port of Daniel Mende's (released under the BSD license) gtp-scan.py utility. It brings the ability to scan for GPRS servers to Metasploit via sending GTP-U v1 and v2 echo requests. |
is it possible to use a list of ip ranges instead of just one host ip? |
This module provides a port of Daniel Mende's (released under the BSD license) gtp-scan.py utility. It brings the ability to scan for GPRS servers to Metasploit via sending GTP-U v1 and v2 echo requests.
Testing Steps
./msfconsole
auxiliary/scanner/gprs/gtp_echo
RHOSTS
option as appropriateExample Usage