TrigMap : A Wrapper For Nmap To Automate The Pentest

Trigmap is a wrapper for Nmap. You can use it to easily start Nmap scan and especially to collect information into a well organised directory hierarchy.

The use of Nmap makes the script portable (easy to run not only on Kali Linux) and very efficient thanks to the optimised Nmap algorithms. Trigmap can performs several tasks using Nmap scripting engine (NSE):

  • Port Scan
  • Service and Version Detection
  • Web Resources Enumeration
  • Vulnerability Assessment
  • Common Vulnerabilities Test
  • Common Exploits Test
  • Dictionary Attacks Against Active Services
  • Default Credentials Test

Also Read – Mquery : YARA Malware Query Accelerator

Usage

Trigmap can be used in two ways:

Interactive mode:

trigmap [ENTER], and the script does the rest

NON-interactive mode:

trigmap -h|–host [-tp|–tcp TCP ports] [-up|–udp UDP ports] [-f|–file file path] [-s|–speed time profile] [-n|–nic NIC] [-p|–phase phases]

If you want to see the help:

trigmap –help to print this helper

Dir Hierarchy

Customization

It’s possible to customize the script by changing the value of variables at the beginning of the file.

In particularly you can choose the wordlists used by the Nmap scripts and the most important Nmap scan parameters (ping, scan, timing and script).

##################################################
PARAMETERS
##################################################
GENERAL_USER_LIST=’general_user_wordlist_short.txt’
WIN_USER_LIST=’win_user_wordlist_short.txt’
UNIX_USER_LIST=’unix_user_wordlist_short.txt’
SHORT_PASS_LIST=’fasttrack.txt’
LONG_PASS_LIST=’rockyou.txt’
##################################################
NMAP SETTING
##################################################
PE (echo req), PP (timestamp-request)
you can add a port on every ping scan
NMAP_PING=’-PE -PS80,443,22,25,110,445 -PU -PP -PA80,443,22,25,110,445′
NMAP_OTHER=’-sV –allports -O –fuzzy –min-hostgroup 256′
SCRIPT_VA='(auth or vuln or exploit or http-* and not dos)’
SCRIPT_BRUTE='(auth or vuln or exploit or http-* or brute and not dos)’
SCRIPT_ARGS=”userdb=$GENERAL_USER_LIST,passdb=$SHORT_PASS_LIST”
CUSTOM_SCAN=’–max-retries 3 –min-rate 250′ # LIKE UNICORNSCAN

Disclaimer:

Author assume no liability and are not responsible for any misuse or damage caused by this program. Trigmap is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

R K

Recent Posts

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

4 hours ago

This Android Bug Can Crack Your Lock Screen in 60 Seconds

A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…

4 days ago

How to Fix MyISAM Table Corruption in MySQL?

In MySQL Server 5.5 and earlier versions, the MyISAM was the default storage engine. So,…

5 days ago

Microsoft Authenticator Flaw Could Leak Login Codes

A newly disclosed vulnerability in Microsoft Authenticator could expose one time sign in codes or…

5 days ago

Modrinth – A Comprehensive Overview of Tools and Functions

Modrinth is a modern platform that’s rapidly changing the landscape of Minecraft modding, providing an…

6 days ago

BlackSanta Malware A Stealthy Threat Targeting Recruiters and HR Teams

A new, highly sophisticated malware campaign named BlackSanta has emerged, primarily targeting HR and recruitment…

6 days ago