OFFPORT_KILLER tool aims at automating the identification of potential service running behind ports identified manually or on services running locally only.
The tool is useful:
Several databases are used such as the one from NMAP, IANA and linux machines.
The tool can be used by pentesters, system admins, CTF players, students, System Auditors and trolls :).
Usage
./OFFPORT_KILLER.sh -i inputfile.txt -r report.txt -e /tmp/
Arguments
Steps
Note: Create an entry for each port, several IP can be input in the file.
inputfile.txt
192.168.1.12:1830
192.168.1.12:7738
192.168.1.14:22
192.168.1.14:7738
192.168.1.15:3465
Read Output
To read output while keeping the aspect (color), especially when cat is not adequate and the output is too long.
Disclaimer
This script is for Educational purpose ONLY. Do not use it without permission. The usual disclaimer applies, especially the fact that me (TH3xACE) is not liable for any damages caused by direct or indirect use of the information or functionality provided by these programs. The author or any Internet provider bears NO responsibility for content or misuse of these programs or any derivatives thereof. By using these programs you accept the fact that any damage (dataloss, system crash, system compromise, etc.) caused by the use of the script is not my responsibility.
Introduction to the Model Context Protocol (MCP) The Model Context Protocol (MCP) is an open…
While file extensions in Linux are optional and often misleading, the file command helps decode what a…
The touch command is one of the quickest ways to create new empty files or update timestamps…
Handling large numbers of files is routine for Linux users, and that’s where the find command shines.…
Managing files and directories is foundational for Linux workflows, and the mv (“move”) command makes it easy…
Creating directories is one of the earliest skills you'll use on a Linux system. The mkdir (make…