2024-09-30 01:43:11 +10:00
|
|
|
# nettacker
|
|
|
|
|
|
|
|
> Automate information gathering, vulnerability scanning and eventually generate a report.
|
|
|
|
> More information: <https://nettacker.readthedocs.io/en/latest/Home/>.
|
|
|
|
|
|
|
|
- List all available modules:
|
|
|
|
|
|
|
|
`nettacker --show-all-modules`
|
|
|
|
|
|
|
|
- Run a port scan on targets:
|
|
|
|
|
2025-03-08 23:08:23 +02:00
|
|
|
`nettacker {{[-m|--modules]}} port_scan {{[-i|--targets]}} {{192.168.0.1/24,owasp.org,scanme.org,...}}`
|
2024-09-30 01:43:11 +10:00
|
|
|
|
|
|
|
- Run a port scan on specific ports and targets listed in a file (newline separated):
|
|
|
|
|
2025-03-08 23:08:23 +02:00
|
|
|
`nettacker {{[-m|--modules]}} port_scan {{[-g|--ports]}} {{22,80,443,...}} {{[-l|--targets-list]}} {{path/to/targets.txt}}`
|
2024-09-30 01:43:11 +10:00
|
|
|
|
|
|
|
- Run ping test before scan and then run multiple scan types on target:
|
|
|
|
|
2025-03-08 23:08:23 +02:00
|
|
|
`nettacker --ping-before-scan {{[-m|--modules]}} {{port_scan,subdomain_scan,waf_scan,...}} {{[-g|--ports]}} {{80,443}} {{[-i|--targets]}} {{owasp.org}}`
|