1. IT-Security >
  2. Cyber Security Nachrichten >
  3. Nray - Distributed Port Scanner

ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

Nray - Distributed Port Scanner


IT Security Nachrichten vom | Direktlink: feedproxy.google.com Nachrichten Bewertung


Nray is a free, platform and architecture independent port and application layer scanner. Apart from regular targets (list of hosts/networks), it supports dynamic target selection, based on source like transparency logs" href="https://www.kitploit.com/search/label/Certificate%20transparency%20logs">certificate transparency logs or LDAP. Furthermore, nray allow to run in a distributed manner to speed up scans and to perform scans from different vantage points. Event-based results allow to further process information during the scan, e.g. using tools like jq or full-blown data analysis platforms like elasticsearch or Splunk.
This is the main repository where nray is developed. Downloads are here. If you are looking for user documentation, have a look at the project homepage. For information related to developing and contributing to nray, continue reading.
Nray is written in pure Go and its versioning follows the semantic versioning model. The development follows Vincent Driessen's "A successful git branching" model, therefore we try to keep the master branch stable and in line with releases whereas development happens on the development branch as well as branches derived from there.

Building
Care was taken to mostly stay in line with Go's build system, meaning that the project can be built with a plain go build. Nray is written in pure Go and care was taken to select only dependencies that also fulfill this requirement, therefore a standard Go installation (plus git) is enough to build nray on and for any supported platform.

With makefile
Nevertheless, there is a makefile that is supposed to be used for building production versions (make release) - it ensures that no C dependencies are linked in and symbols are stripped from binaries to save space. Also, binaries for most common operating systems are created automatically. A call to make will build a local development version, tailored to your current OS and architecture with C libraries and Go's race detector linked in.

Without makefile
Simply run go build - in case cross compiling is desired, GOOS and GOARCH parameters control target OS and architecture. For nodes, it is possible to inject server location and port directly into the binary: go build -ldflags "-X main.server=10.0.0.1 -X main.port=8601". To get smaller binaries, strip stuff that is not necessary away via -ldflags="-s -w" when calling go build. If you need to rebuild the protobuf schemas (this is not required unless you change the wire protocol!), run make create-schemas (which requires the protobuf compiler on your system).

Contributing and Development
Just grab the code and fix stuff that annoys you or hack in new awesome features! Every contribution is welcome and the goal is to make nray an awesome project for users and contributors!
Your code should pass standard checks performed by go vet and go lint. I recommend using Visual Studio Code with its Go support enabled, it is a really good IDE that brings such issues up early. Nray is always developed against the latest Go release, so if you are having trouble building nray, check if you have the latest go version installed.


...

Externe Webseite mit kompletten Inhalt öffnen

http://feedproxy.google.com/~r/PentestTools/~3/uUwUFSIzAtI/nray-distributed-port-scanner.html

Team Security Social Media

➤ Weitere Beiträge von Team Security | IT Sicherheit

  • Nray - Distributed Port Scanner

    vom 683.19 Punkte ic_school_black_18dp
    Nray is a free, platform and architecture independent port and application layer scanner. Apart from regular targets (list of hosts/networks), it supports dynamic target selection, based on source like transparency logs" href="https://www.kitploit.com/
  • AutoRecon - Multi-Threaded Network Reconnaissance Tool Which Performs Automated Enumeration Of Services

    vom 358.33 Punkte ic_school_black_18dp
    AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services. It is intended as a time-saving tool for use in CTFs and other penetration testing environments (e.g. OSCP). It may also be useful in real-world engagements. The tool works by firstly performing port scans/service detection scans. From those initial results, the tool will launch further enum
  • Improvements in .NET Core 3.0 for troubleshooting and monitoring distributed apps

    vom 341.56 Punkte ic_school_black_18dp
    Post was authored by Sergey Kanzhelev. Thank you David Fowler and Richard Lander for reviews. Introduction Operating distributed apps is hard. Distributed apps typically consists of multiple components. These components may be owned and operated by different teams. Every interact
  • PivotSuite - A Network Pivoting Toolkit

    vom 306.32 Punkte ic_school_black_18dp
    PivotSuite is a portable, platform independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use a compromised system to move around inside a network. It is a Standalone Utility, Which can use as a Server or as a Client.PivotSuite as a Server :If the compromised host is directly accessable (Forward Connection) from Our pentest machine, Then we can run
  • Cotopaxi - Set Of Tools For Security Testing Of Internet Of Things Devices Using Specific Network IoT Protocols

    vom 271.64 Punkte ic_school_black_18dp
    Set of tools for security testing of Internet of Things devices using protocols like: CoAP, DTLS, HTCPCP, mDNS, MQTT, SSDP.Installation:Simply clone code from git: https://github.com/Samsung/cotopaxiRequirements:Currently Cotopaxi works only with Python
  • Venom - A Multi-hop Proxy For Penetration Testers

    vom 236.96 Punkte ic_school_black_18dp
    Venom is a multi-hop proxy tool developed for penetration testers using Go. You can use venom to easily proxy network traffic to a multi-layer intranet, and easily manage intranet nodes.Features network topology multi-hop socks5 proxy multi-hop port forward port r
  • Sshtunnel - SSH Tunnels To Remote Server

    vom 202.28 Punkte ic_school_black_18dp
    Inspired by https://github.com/jmagnusson/bgtunnel, which doesn't work on Windows.See also: https://github.com/paramiko/paramiko/blob/master/demos/forward.py Requirementsparamiko Installationsshtunnel is on PyPI, so simply run:pip install sshtunneloreasy_
  • Help needed with running Python script that uses Selenium

    vom 190.73 Punkte ic_school_black_18dp
    Hey all, I'm trying to use a tool that I successfully used on Ubuntu now that I've swapped that out for Parrot. I ended up jumping over to Parrot for all of the included security tools but it's shot me in the foot and I'm hoping you can help. I'm pr
  • Strelka - Scanning Files At Scale With Python And ZeroMQ

    vom 181.08 Punkte ic_school_black_18dp
    Strelka is a real-time file scanning system used for threat hunting, threat detection, and incident response. Based on the design established by Lockheed Martin's Laika BOSS and similar projects (see: related projects), Strelka's purpose is to perfor
  • Scannerl - The Modular Distributed Fingerprinting Engine

    vom 180.23 Punkte ic_school_black_18dp
    Scannerl is a modular distributed fingerprinting engine implemented by Kudelski Security. Scannerl can fingerprint thousands of targets on a single host, but can just as easily be distributed across multiple hosts. Scannerl is to fingerprinting what zmap
  • Azure Load Balancer becomes more efficient

    vom 156.05 Punkte ic_school_black_18dp
    Azure introduced an advanced, more efficient Load Balancer platform in late 2017. This platform adds a whole new set of abilities for customer workloads using the new Standard Load Balancer. One of the key additions the new Load Balancer platform br
  • Scanner-Cli - A Project Security/Vulnerability/Risk Scanning Tool

    vom 151.18 Punkte ic_school_black_18dp
    The Hawkeye scanner-cli is a project security, vulnerability and general risk highlighting tool. It is meant to be integrated into your pre-commit hooks and your pipelines.Running and configuring the scannerThe Hawkeye scanner-cli assumes that your dir

Team Security Diskussion über Nray - Distributed Port Scanner