Distributed Network Vulnerability Scanner
Switch branches/tags
Nothing to show
Clone or download
tlkh Merge pull request #4 from tlkh/imgbot
[ImgBot] optimizes images
Latest commit 7a6d1ea Oct 3, 2018
Type Name Latest commit message Commit time
Failed to load latest commit information.
app_old Updated media files Mar 21, 2018
data Scan for host OS Mar 17, 2018
images [ImgBot] optimizes images Oct 3, 2018
media Updated presentation Mar 31, 2018
playbooks Scan for host OS Mar 17, 2018
test_files Updated media files Mar 21, 2018
wordlists Scan for host OS Mar 17, 2018
.compute.py.swo Scan for host OS Mar 17, 2018
.gitignore Scan for host OS Mar 17, 2018
.travis.yml Scan for host OS Mar 17, 2018
ClusterDemo.ipynb Scan for host OS Mar 17, 2018
LICENSE Scan for host OS Mar 17, 2018
README.md Typo Mar 21, 2018
SingleDemo.ipynb Scan for host OS Mar 17, 2018
cluster.py Updated media files Mar 21, 2018
pylintrc Scan for host OS Mar 17, 2018
requirements.txt MVP Mar 20, 2018
setup_node.sh fixed requirements file Mar 4, 2018
start.sh networking works finally Mar 6, 2018



Prowler is a Network Vulnerability Scanner implemented on a Raspberry Pi Cluster, first developed during Singapore Infosec Community Hackathon - HackSmith v1.0.

Black Hat Aresenal 2018 License: MIT



  • Scan a network (a particular subnet or a list of IP addresses) for all IP addresses associated with active network devices
  • Determine the type of devices using fingerprinting
  • Determine if there are any open ports on the device
  • Associate the ports with common services
  • Test devices against a dictionary of factory default and common credentials
  • Notify users of security vulnerabilities through an dashboard. Dashboard tour

Planned Capabilities

  • Greater variety of vulnerability assessment capabilities (webapp etc.)
  • Select wordlist based on fingerprint


  • Raspberry Pi Cluster HAT (with 4 * Pi Zero W)
  • Raspberry Pi 3
  • Networking device


Software Stack

  • Raspbian Stretch (Controller Pi)
  • Raspbian Stretch Lite (Worker Pi Zero)
  • Note: For ease of setup, use the images provided by Cluster Hat! Instructions
  • Python 3 (not tested on Python 2)
  • Python packages see requirements.txt
  • Ansible for managing the cluster as a whole (/playbooks)

Key Python Packages:

  • dispy (website) is the star of the show. It allows allows us to create a job queue that will be processed by the worker nodes.
  • python-libnmap is the python wrapper around nmap, an open source network scanner. It allows us to scan for open ports on devices.
  • paramiko is a python wrapper around SSH. We use it to probe SSH on devices to test for common credentials.
  • eel is used for the web dashboard (seperate repository, here)
  • rabbitmq (website) is used to pass the results from the cluster to the eel server that is serving the dashboard page.

Ansible Playbooks

For the playbooks to work, ansible must be installed (sudo pip3 install ansible). Configure the IP addresses of the nodes at /etc/ansible/hosts. WARNING: Your mileage may vary as these were only tested on my setup

  • shutdown.yml and reboot.yml self-explanatory
  • clone_repos.yml clone prowler and dispy repositories (required!) on the worker nodes
  • setup_node.yml installs all required packages on the worker nodes. Does not clone the repositories!

Deploying Prowler

  1. Clone the git repository: git clone https://github.com/tlkh/prowler.git
  2. Install dependencies by running sudo pip3 install -r requirements.txt on the controller Pi
  3. Run ansible-playbook playbooks/setup_node.yml to install the required packages on worker nodes.
  4. Clone the prowler and dispy repositories to the worker nodes using ansible-playbook playbooks/clone_repos.yml
  5. Run clusterhat on on the controller Pi to ensure that all Pi Zeros are powered up.
  6. Run python3 cluster.py on the controller Pi to start Prowler

To edit the range of IP addresses being scanned, edit the following lines in cluster.py:

test_range = []

    for i in range(0, 1):
        for j in range(100, 200):
            test_range.append("172.22." + str(i) + "." + str(j))

Old Demos

Useful Snippets

  • To run ssh command on multiple devices, install pssh and pssh -h pssh-hosts -l username -A -i "command"
  • To create the cluster (in compute.py): cluster = dispy.JobCluster(compute, nodes='pi0_ip', ip_addr='pi3_ip')
  • Check connectivity: ansible all -m ping or ping p1.local -c 1 && ping p2.local -c 1 && ping p3.local -c 1 && ping p4.local -c 1
  • Temperature Check: /opt/vc/bin/vcgencmd measure_temp && pssh -h workers -l pi -A -i "/opt/vc/bin/vcgencmd measure_temp" | grep temp
  • rpimonitor (how to install):

more random graphs


  • Faith See
  • Wong Chi Seng
  • Timothy Liu

ABSOLUTELY NO WARRANTY WHATSOEVER! Feel free to submit issues though.