TSEC NEWS: 06.05.21 Cron-Job Fehlerhaft nach PHP Update + PWA mobile + Desktop / 04.05.21 - Android App von TSECURITY 28.04.21 - NEUER SERVER // 26.04.21 ++ Download the Electron-App für tsecurity.de // Über 550 Feed-Quellen


❈ OFFPORT_KILLER - This Tool Aims At Automating The Identification Of Potential Service Running Behind Ports Identified Manually Either Through Manual Scan Or Services Running Locally

IT Security Nachrichten feedproxy.google.com


#Manual Port Scanning #Enumerate Potential Service

If you like the tool and for my personal motivation so as to develop other tools please a +1 star *


INTRO

This tool aims at automating the identification of potential service running behind ports identified manually or on services running locally only.

The tool is useful:

1. when nmap or any scanning tool is not available and in the situation during which you did a manual port scanning and then want to identify the services running behind the identified ports and

2.also if you have been able to identify services running locally via (netstat, running processes SNMP or else).

Several databases are used such as the one from NMAP, IANA and linux machines.

The tool can be used by pentesters, system admins, CTF players, students, System Auditors and trolls :).


Usage

Example
./OFFPORT_KILLER.sh -i inputfile.txt -r report.txt -e /tmp/

Arguments
  • -i : input file (format IP:PORT)
  • -r : report name (save the output)
  • -h : help

Steps
  • Step 1: Peform a manual port scanning (using nc, tcpdump or whatever) or identify services running locally
  • Step 2: Create a file with format IP:PORT (where IP is the target IP address and PORT is a port identified).
  • Step 3: Run the tool with the file created using the argument -i

Note: Create an entry for each port, several IP can be input in the file.


inputfile.txt
192.168.1.12:1830
192.168.1.12:7738
192.168.1.14:22
192.168.1.14:7738
192.168.1.15:3465

Output



Read output

To read output while keeping the aspect (color), especially when cat is not adequate and the output is too long.

  • less -R report.txt

Disclaimer

This script is for Educational purpose ONLY. Do not use it without permission. The usual disclaimer applies, especially the fact that me (TH3xACE) is not liable for any damages caused by direct or indirect use of the information or functionality provided by these programs. The author or any Internet provider bears NO responsibility for content or misuse of these programs or any derivatives thereof. By using these programs you accept the fact that any damage (dataloss, system crash, system compromise, etc.) caused by the use of the script is not my responsibility.



...


Kompletten Artikel lesen (externe Quelle: http://feedproxy.google.com/~r/PentestTools/~3/78ROR5zW6pI/offportkiller-this-tool-aims-at.html)

Zur Startseite

➤ Weitere Beiträge von Team Security | IT Sicherheit (tsecurity.de)

OFFPORT_KILLER - This Tool Aims At Automating The Identification Of Potential Service Running Behind Ports Identified Manually Either Through Manual Scan Or Services Running Locally

vom 1401.34 Punkte
#Manual Port Scanning #Enumerate Potential Service If you like the tool and for my personal motivation so as to develop other tools please a +1 star *INTRO This tool aims at automating the identification of potential service running behind ports identified manually

AutoRecon - Multi-Threaded Network Reconnaissance Tool Which Performs Automated Enumeration Of Services

vom 993.48 Punkte
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services. It is intended as a time-saving tool for use in CTFs and other penetration testing environments (e.g. OSCP). It may also be useful in real-world engagements. The tool works by firstly performing port scans/service detection scans. From those initial results, the tool will launch further enum

Celerystalk - An Asynchronous Enumeration and Vulnerability Scanner

vom 598.88 Punkte
celerystalk helps you automate your network scanning/enumeration process with asynchronous jobs (aka tasks) while retaining full control of which tools you want to run. Configurable - Some common tools are in the default config, but you can add any tool yo

Azure Marketplace new offers – Volume 26

vom 588.68 Punkte
We continue to expand the Azure Marketplace ecosystem. During September and October, 149 new consulting offers successfully met the onboarding criteria and went live. See details of the new offers below: Consulting Services   1-Day Big D

Azure Marketplace new offers – Volume 26

vom 588.68 Punkte
We continue to expand the Azure Marketplace ecosystem. During September and October, 149 new consulting offers successfully met the onboarding criteria and went live. See details of the new offers below: Consulting Services   1-Day Big D

DivideAndScan - Divide Full Port Scan Results And Use It For Targeted Nmap Runs

vom 523.92 Punkte
Divide Et Impera And Scan (and also merge the scan results) DivideAndScan is used to efficiently automate port scanning routine by splitting it into 3 phases: Discover open ports for a bunch of targets. Run Nmap individually for each target with version grabbing and NSE actions. Merge the results into a single Nmap report (different formats available). For the 1st phase a fast port scanner

Azure Marketplace new offers – Volume 28

vom 487.41 Punkte
We continue to expand the Azure Marketplace ecosystem. From November 17 to November 30, 2018, 80 new offers successfully met the onboarding criteria and went live. See details of the new offers below: Virtual machines CloudflareA

Vcpkg: 2019.06 Update

vom 402.49 Punkte
Vcpkg: 2019.06 Update The 2019.06 update of vcpkg, a tool that helps you manage C and C++ libraries on Windows, Linux, and MacOS, is now available. This is the first time we’ve created a vcpkg release on our GitHub repository. This update is designed to bring you a summ

Malcolm - A Powerful, Easily Deployable Network Traffic Analysis Tool Suite For Full Packet Capture Artifacts (PCAP Files) And Zeek Logs

vom 356.35 Punkte
Malcolm is a powerful network traffic analysis tool suite designed with the following goals in mind: Easy to use – Malcolm accepts network traffic data in the form of full packet capture (PCAP) files and Zeek (formerly Bro) logs. These artifacts can be

Netmap.Js - Fast Browser-Based Network Discovery Module

vom 339.08 Punkte
Fast browser-based network discovery module Description netmap.js provides browser-based host discovery and port scanning capabilities to allow you to map website visitors' networks. It's quite fast, making use of es6-promise-pool to efficiently run

Jok3R - Network And Web Pentest Framework

vom 333.58 Punkte
Jok3r is a Python3 CLI application which is aimed at helping penetration testers for network infrastructure and web black-box security tests.Its main goal is to save time on everything that can be automated during network/web pentest in order to enjoy more

AA20-239A: FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks

vom 307.83 Punkte
Original release date: August 26, 2020SummaryThis Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. This joint advisory is

Team Security Diskussion über OFFPORT_KILLER - This Tool Aims At Automating The Identification Of Potential Service Running Behind Ports Identified Manually Either Through Manual Scan Or Services Running Locally