TrigMap : A Wrapper For Nmap To Automate The Pentest

Trigmap is a wrapper for Nmap. You can use it to easily start Nmap scan and especially to collect information into a well organised directory hierarchy.

The use of Nmap makes the script portable (easy to run not only on Kali Linux) and very efficient thanks to the optimised Nmap algorithms. Trigmap can performs several tasks using Nmap scripting engine (NSE):

  • Port Scan
  • Service and Version Detection
  • Web Resources Enumeration
  • Vulnerability Assessment
  • Common Vulnerabilities Test
  • Common Exploits Test
  • Dictionary Attacks Against Active Services
  • Default Credentials Test

Also Read – Mquery : YARA Malware Query Accelerator

Usage

Trigmap can be used in two ways:

Interactive mode:

trigmap [ENTER], and the script does the rest

NON-interactive mode:

trigmap -h|–host [-tp|–tcp TCP ports] [-up|–udp UDP ports] [-f|–file file path] [-s|–speed time profile] [-n|–nic NIC] [-p|–phase phases]

If you want to see the help:

trigmap –help to print this helper

Dir Hierarchy

Customization

It’s possible to customize the script by changing the value of variables at the beginning of the file.

In particularly you can choose the wordlists used by the Nmap scripts and the most important Nmap scan parameters (ping, scan, timing and script).

##################################################
PARAMETERS
##################################################
GENERAL_USER_LIST=’general_user_wordlist_short.txt’
WIN_USER_LIST=’win_user_wordlist_short.txt’
UNIX_USER_LIST=’unix_user_wordlist_short.txt’
SHORT_PASS_LIST=’fasttrack.txt’
LONG_PASS_LIST=’rockyou.txt’
##################################################
NMAP SETTING
##################################################
PE (echo req), PP (timestamp-request)
you can add a port on every ping scan
NMAP_PING=’-PE -PS80,443,22,25,110,445 -PU -PP -PA80,443,22,25,110,445′
NMAP_OTHER=’-sV –allports -O –fuzzy –min-hostgroup 256′
SCRIPT_VA='(auth or vuln or exploit or http-* and not dos)’
SCRIPT_BRUTE='(auth or vuln or exploit or http-* or brute and not dos)’
SCRIPT_ARGS=”userdb=$GENERAL_USER_LIST,passdb=$SHORT_PASS_LIST”
CUSTOM_SCAN=’–max-retries 3 –min-rate 250′ # LIKE UNICORNSCAN

Disclaimer:

Author assume no liability and are not responsible for any misuse or damage caused by this program. Trigmap is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

R K

Recent Posts

Starship : Revolutionizing Terminal Experiences Across Shells

Starship is a powerful, minimal, and highly customizable cross-shell prompt designed to enhance the terminal…

1 day ago

Lemmy : A Decentralized Link Aggregator And Forum For The Fediverse

Lemmy is an innovative, open-source platform designed for link aggregation and discussion, providing a decentralized…

1 day ago

Massive UX Improvements, Custom Disassemblers, And MSVC Support In ImHex v1.37.0

The latest release of ImHex v1.37.0 introduces a host of exciting features and improvements, enhancing…

1 day ago

Ghauri : A Powerful SQL Injection Detection And Exploitation Tool

Ghauri is a cutting-edge, cross-platform tool designed to automate the detection and exploitation of SQL…

1 day ago

Writing Tools : Revolutionizing The Art Of Writing

Writing tools have become indispensable for individuals looking to enhance their writing efficiency, accuracy, and…

1 day ago

PatchWerk : A Tool For Cleaning NTDLL Syscall Stubs

PatchWerk is a proof-of-concept (PoC) tool designed to clean NTDLL syscall stubs by patching syscall…

2 days ago