Skip to content

Inputs a list of IP addresses, and creates Docker images for the number of IPs imported. For use when automating mass scanning, or pentesting of large networks. [Ensures the destruction of Alderaan, everytime.]

License

Notifications You must be signed in to change notification settings

tcoatswo/the_deathstar

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

The Deathstar

  • The Deathstar can be used to automate those pesky pre-scanning reconnaisance needed before a pentration test.
  • Automate any tools used in your daily arsenal: Nmap, Openssl Scans, Nikto -- the process is up to you.

Requirements

  • Docker is installed on your system
  • Whatever scanning/tools you use and scripts are placed in a Docker template.

Usage

  • Set the list of IPs to target with the variable ipListLocation (default location set to "/home/ubuntu/IPlist.txt") -- The IPs should be stored as a .txt file with each IP denoted on its own separate line
  • Results will be outputed, and then copied to the specified location (default location set to "/home/ubuntu/SCAN-RESULTS/") -- The output will be separated by Deathstar box.

How it works

The Deathstar takes the IPlist.txt and parses it for the number of IPs that need to be imported. It defaults to creating 1 docker container instance for every 10 IPs listed. In this way it can be more efficent when delegating tasks (if you run this on something like AWS you can then also increase the processing power that the whole machine will have, in turn giving Docker Deathstars more computation resources to work with -- this is highly dependant on your needs).

The 10 IPs then get copied into the docker container (takes a saved template -- in this case mine is named "ubuntu:v10")

  • Within the template (e.g. ubuntu:v10) you place the scanning tools needed and custom scripts used for pre-pen recon.
  • In this use case each ubuntu:v10 had one script that got called:

docker exec -d deathstar#{$i} python start.py

  • This start.py contained all the commands to start the desired scans (nmap, nikto, custom scripts) Edit line 97 as needed.

Then you sit back and enjoy the demolition!

"I think it is time we demonstrated the full power of this station. Set your course for Alderaan." - Governor Tarkin

Happy hacking!

About

Inputs a list of IP addresses, and creates Docker images for the number of IPs imported. For use when automating mass scanning, or pentesting of large networks. [Ensures the destruction of Alderaan, everytime.]

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages