VScan is a vulnerability scanner tool is using nmap and nse scripts to find vulnerabilities. This tool puts an additional value into vulnerability scanning with nmap.
It uses NSE scripts which can add flexibility in terms of vulnerability detection and exploitation. Below there are some of the features that NSE scripts provide
This tool uses the path /usr/share/nmap/scripts/
where the nse scripts are located in kali linux
The tool performs the following
If the tool finds a vulnerabilty in a certain protocol (e.g http) it keeps the output into a log file which is created and saved in the following location /home/vulnerabilities_enumeration/http_vulnerabilities/http_vulnerabilities/http_vulnerabilities.txt
In this example the folders have been created using the protocol prefix which in the current occasion is the http protocol.
Also Read – EyeWitness : Designed To Take Screenshots Of Websites
Usage
[Usage:] ./vscan.sh <ip_range> <protocol> <port> <Pn (optional)>[Usage:] ./vscan.sh <ips_file> <protocol> <port> <Pn (optional)>[Usage:] ./vscan.sh <ip> <protocol> <port> <Pn (optional)>
How to run?
./vscan.sh 192.168.162.90 http 80
./vscan.sh 192.168.162.10-90 http 80
./vscan.sh 192.168.162.90 ssh 22 Pn
./vscan.sh IPs.txt smb 445
References
Screenshots
###Example: SMB scanning
###Example: Slowloris vulnerability detection
###Example: multiple IP scanning SSH weak keys
###Example: When the system is down or no ICMP requests
Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…
Docker is one of the most widely used containerization platforms. But there may come a…
Introduction Google Dorking is a technique where advanced search operators are used to uncover information…
Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…
What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…
Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…