This script performs a comprehensive network security scan, including Nmap, Enum4linux, DNS enumeration, Nikto, Netcat, Masscan, and Hydra brute-force testing. It generates an HTML report containing all the results for further analysis.
- Nmap Scan: Performs an extensive network scan with OS detection, version detection, script scanning, and traceroute.
- Enum4linux: Gathers information from Windows machines using SMB.
- DNS Enumeration: Performs forward and reverse DNS lookups, and attempts DNS zone transfer.
- Nikto: Scans for web server vulnerabilities.
- Netcat Port Scanning: Tests common ports on a target.
- Masscan: Performs a fast port scan for the entire target range.
- Hydra Brute-force Attack: Attempts password brute-forcing using a list of usernames and passwords via SSH.
Ensure you have the following tools installed on your Debian-based system:
- Nmap
- Enum4linux
- DNS tools (e.g., host, dig)
- Nikto
- Netcat
- Masscan
- Hydra
Run the following commands to install the necessary tools on a Debian-based system:
sudo apt update
sudo apt install nmap enum4linux dnsutils nikto netcat masscan hydraSteps:
- Clone the repository:
https://github.com/Abdullah-XDev/Network-Security-Scanning-NSS-Scripts.git- Navigate to the project directory:
cd Network-Security-Scanning-NSS-Scripts- Make the script executable:
chmod +x anyfile_scan.sh- Run the script as root:
sudo ./anyfile_scan.sh-
Follow the prompts to enter the target network, domain for DNS enumeration, and target URL/IP for the Nikto scan.
-
After the scan is completed, a report will be saved as an HTML file in the results directory.
The final report will include:
1.Nmap results 2.Enum4linux results 3.DNS enumeration results 4.Nikto scan results 5.Netcat port testing results 6.Masscan results 7.Hydra brute-force results
This script is for educational purposes only. Unauthorized use against networks you do not own or have explicit permission to test is illegal. Use responsibly and within the confines of the law.
