NLAS - Nmap Lan Auditoria Script
Inspirado em pentesters que precisam rápida auditoria lan
Inspirado em pentesters que precisam rápida auditoria lan
Download Link: [Tens de ter uma conta e sessão iniciada para poderes visualizar este link]
- Código:
#!/usr/bin/python2
#
# NLAS - Nmap Lan Auditing Script
# Autor: Camilo Galdos AkA Dedalo
# http://www.seguridadblanca.com - http://open-sec.com
# Dependencias: nmap
# Thanks To: Open-Sec Team - Cesar Neira & StackOverflow Web Site.
import os
import sys
import socket
import fcntl
import struct
import datetime
import time
print "For Making all my options work, run me as r00t"
d = raw_input("Pree C to Continue or Q to quit:\n")
if d == "q" or d == "Q":
sys.exit(0)
if d == "c" or d == "C":
os.system("clear");
else:
sys.exit(0)
print "##########Welcome to NLAS##########"
print "# Nmap Lan Auditing Script #"
print "# 2013(c) #"
print "#####################################"
time.sleep(3)
print "1.- Discover Ips on My subnet"
print "2.- FAST Scan to my Subnet"
print "3.- Full Scan to my Subnet"
print "4.- Discover IPs on My Subnet [Try To Bypass Firewall]"
print "5.- FAST Scan to my Subnet [Try To Bypass Firewall]"
print "6.- Full Scan to my Subnet [Try To Bypass Firewall] "
print "7.- 0wn Th3 L4n"
op = raw_input("Select And Option (Type Number): ")
nombre = raw_input("Name of the LAN (For Saving Files): ")
def get_ip_address(ifname):
s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
return socket.inet_ntoa(fcntl.ioctl(
s.fileno(),
0x8915,
struct.pack('256s', ifname[:15])
)[20:24])
def get_netmask(ifname):
s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
return socket.inet_ntoa(fcntl.ioctl(s.fileno(), 0x891b, struct.pack('256s',ifname))[20:24])
interfaz = raw_input("Type your Interface(Ex: eth0): ")
miip = get_ip_address(interfaz)
octe = get_netmask(interfaz)
binario = ''.join([bin(int(x)+256)[3:] for x in octe.split('.')])
lens = len(binario) - len(binario.strip("1"))
sup = ".0/" + str(lens)
miip2 = miip.split(".")
miip3 = miip2[0:3]
miip4 = ".".join(miip3)
milan = miip4 + sup
if op == "1":
a1 = "nmap -v -sP " + milan + " --reason -oA " + nombre + "attack1"
print a1
a = os.system(a1)
print a
elif op == "2":
a1 = "nmap -v -n -PN -F --max-retries 2 " + milan + " --reason -oA " + nombre + "attack2"
print a1
a = os.system(a1)
print a
elif op == "3":
a1 = "nmap -v -sV -p- " + milan + " --reason -oA " + nombre + "attack3"
print a1
a = os.system(a1)
print a
elif op == "4":
a1 = "nmap -v -PN -sP -T2 -f " + milan + " --reason -oA " + nombre + "attack1bypass"
print a1
a = os.system(a1)
print a
elif op == "5":
a1 = "nmap -v -n -PN -F -T2 -f --max-retries 2 " + milan + " --reason -oA " + nombre + "attack2bypass"
print a1
a = os.system(a1)
print a
elif op == "6":
a1 = "nmap -v -PN -sV -p- -T2 -f " + milan + " --reason -oA " + nombre + "attack3Bypass"
print a1
a = os.system(a1)
print a
elif op == "7":
a1 = "nmap -v -PN -A -sV -p- -T2 -O " + milan + " --reason -oA " + nombre + "0wnth3l4n"
print a1
a = os.system(a1)
print a
else:
print "I Will Be Making a simple scan"
time.sleep(5)
a1 = "nmap " + milan + " -oA " + nombre + "EscaneoBasico"
print a1
a = os.system(a1)
print a