generated from cotes2020/chirpy-starter
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
e4f1c3c
commit 5cc0ef7
Showing
1 changed file
with
0 additions
and
100 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,100 +0,0 @@ | ||
--- | ||
title: "NetGun, Vulnerability Scanner for Kali OS 💻" | ||
date: 2022-06-03 00:00:00 +0800 | ||
categories: [NetGun - Vulnerability Scanner] | ||
tags: [NetGun, Vulnerability Scanner] | ||
--- | ||
|
||
<style> | ||
.centered-image { | ||
text-align: center; | ||
} | ||
</style> | ||
|
||
> NetGun is an open source project available on GitHub, developed by Me (Carlo Colizzi), Giulio Incoronato, and Antonio Mazzarella | ||
{: .prompt-info } | ||
|
||
> NetGun is a Vulnerability Scanner written in Python. It allows to scan Network infrastructures, enumerate the services running on them, unearth CVEs and Misconfigurations. It aims to facilitate a complex practice such as Penetration Testing, so that PTs can focus on more delicate aspects, automating and speeding up the tasks behind this type of Testing. | ||
{: .prompt-tip } | ||
|
||
<img src="https://github.com/Carlo-Colizzi/NetGun/blob/main/source_code/persistence/storage/assets/netgun_logo.png" alt="logo"> | ||
|
||
## NetGun allows you to | ||
<ul> | ||
<li> Detect open and closed ports on any accessible target host </li> | ||
<li> Detect the Operating System</li> | ||
<li> Detect the services running on each port</li> | ||
<li> Detect firewalls</li> | ||
<li> Detect tipical misconfigurations</li> | ||
<li> Detect CVEs on services</li> | ||
</ul> | ||
|
||
## Installation | ||
```bash | ||
git clone https://github.com/Carlo-Colizzi/NetGun | ||
cd NetGun | ||
pip install -r requirements.txt | ||
``` | ||
|
||
## How to Use | ||
<p>> Here you can set the details of the scan</p> | ||
<div style="display: block; margin: auto;"> | ||
<img src="https://github.com/Carlo-Colizzi/NetGun/blob/main/source_code/persistence/storage/assets/scan_details.png" alt="details"> | ||
</div> | ||
<p>> You can set IPv4 and Port range</p> | ||
<div class="centered-image"> | ||
<img src="https://github.com/Carlo-Colizzi/NetGun/blob/main/source_code/persistence/storage/assets/set_ip_and_ports.png" alt="IPv4 and Port range"> | ||
</div> | ||
<p>> Choose the protocol used by the researched services, TCP or UDP</p> | ||
<div class="centered-image"> | ||
<img src="https://github.com/Carlo-Colizzi/NetGun/blob/main/source_code/persistence/storage/assets/protocol.png" alt="TCP or UDP"> | ||
</div> | ||
<p>> Choose the Advanced Options:</p> | ||
<ul> | ||
<li><strong>OS detection</strong>: let to discover the OS used by the Target</li> | ||
<li><strong>Disable PING</strong>: during the scan the ping functionality will not be used</li> | ||
<li><strong>SYN scan</strong>: SYN scan is the default and most popular scan option for good reason. It can be performed quickly, scanning thousands of ports per second on a fast network not hampered by intrusive firewalls. SYN scan is relatively unobtrusive and stealthy, since it never completes TCP connections.</li> | ||
<li><strong>ACK scan</strong>: Its probe packet has only the ACK flag set. When scanning unfiltered systems, open and closed ports will both return a RST packet. NetGun then labels them as unfiltered, meaning that they are reachable by the ACK packet, but whether they are open or closed is undetermined. Ports that don't respond, or send certain ICMP error messages back, are labeled filtered.</li> | ||
<br> | ||
<p><strong>Important: </strong> you can't use SYN scan and ACK scan together</p> | ||
</ul> | ||
|
||
<div class="centered-image"> | ||
<img src="https://github.com/Carlo-Colizzi/NetGun/blob/main/source_code/persistence/storage/assets/advanced_options.png" alt="Advanced Options"> | ||
</div> | ||
<p>> Choose the scan mode:</p> | ||
<ul> | ||
<li><strong>SHALLOW</strong>: a shallow and stealth scan, do not look for services version</li> | ||
<li><strong>DEEP</strong>: a deep scan, look also for services version</li> | ||
</ul> | ||
<div class="centered-image"> | ||
<img src="https://github.com/Carlo-Colizzi/NetGun/blob/main/source_code/persistence/storage/assets/set_deep_or_shallow.png" alt="Scan Mode"> | ||
</div> | ||
<p>> Choose the scan aggressivity, from 0 (slow and stealth) to 4 (fast)</p> | ||
<div class="centered-image"> | ||
<img src="https://github.com/Carlo-Colizzi/NetGun/blob/main/source_code/persistence/storage/assets/scan_aggressivity.png" alt="Aggressivity"> | ||
</div> | ||
<p>> When the scan terminate, you will see the results in such a table:</p> | ||
<div class="centered-image"> | ||
<img src="https://github.com/Carlo-Colizzi/NetGun/blob/main/source_code/persistence/storage/assets/scan_result.png" alt="Results"> | ||
</div> | ||
|
||
## CVE analysis | ||
<p>> You can check all the CVEs of a specific service just selecting it and clicking "Open CVE". The Vulnerabilities are obtained through the National Vulnerability Database of U.S. government</p> | ||
<div class="centered-image"> | ||
<img src="https://github.com/Carlo-Colizzi/NetGun/blob/main/source_code/persistence/storage/assets/search_cve.png" alt="CVEs"> | ||
</div> | ||
|
||
## Speedtest by OOkla | ||
<p>> You can also make a Speedtest:</p> | ||
<div class="centered-image"> | ||
<img src="https://github.com/Carlo-Colizzi/NetGun/blob/main/source_code/persistence/storage/assets/speedtest.png" alt="Speedtest"> | ||
</div> | ||
|
||
## Other Images | ||
<div class="centered-image"> | ||
<img src="https://github.com/Carlo-Colizzi/NetGun/blob/main/source_code/persistence/storage/assets/scan_loading.png" alt="Example 1"> | ||
<img src="https://github.com/Carlo-Colizzi/NetGun/blob/main/source_code/persistence/storage/assets/scan_and_cve_view.png" alt="Example 2"> | ||
<img src="https://github.com/Carlo-Colizzi/NetGun/blob/main/source_code/persistence/storage/assets/welcome.png" alt="Example 3"> | ||
<img src="https://github.com/Carlo-Colizzi/NetGun/blob/main/source_code/persistence/storage/assets/scan_view.png" alt="Example 4"> | ||
</div> | ||