Skip to content

firefart/massnmap

Repository files navigation

MASSNMAP

This little script gets all DNS A records for a given zone via zone transfer (your machine must be allowed for it), gathers open ports via massscan and then fires up single nmap scans for version detection and scripts of the single hosts. The ports to scan are determined via the nmap-services file. The output is saved in various files and all NMAP xml outputs are stored in the results folder for further processing.

To configure the scan modify the provided scan.cfg.example and pass it via the -c parameter

Requirements

  • Python3
  • massscan
  • nmap

Sample

./run.py -c scan.cfg

Running as a service

sudo setcap cap_net_raw,cap_net_admin,cap_net_bind_service+eip $(which nmap)
sudo setcap cap_net_raw,cap_net_admin,cap_net_bind_service+eip $(which masscan)

About

Scans an internal network using massscan and nmap

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Sponsor this project

  •  

Packages

No packages published

Contributors 2

  •  
  •