Python NMAP -API -Funktionalität
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
import nmap
scanner = nmap.PortScanner()
ip_addr = '127.0.0.1'
response = input("""\nPlease enter the type of scan you want to run
1)SYN ACK Scan
2)UDP Scan
3)Comprehensive Scan
4)Regular Scan
5. OS Detection
6. Multiple IP inputs
7. Ping Scan\n""")
print("You have selected option: ", response)
# If user's input is 1, perform a SYN/ACK scan
if response == '1':
print("Nmap Version: ", scanner.nmap_version())
# Here, v is used for verbose, which means if selected it will give extra information
# 1-1024 means the port number we want to search on
#-sS means perform a TCP SYN connect scan, it send the SYN packets to the host
scanner.scan(ip_addr,'1-1024', '-v -sS')
print(scanner.scaninfo())
# state() tells if target is up or down
print("Ip Status: ", scanner[ip_addr].state())
# all_protocols() tells which protocols are enabled like TCP UDP etc
print("protocols:",scanner[ip_addr].all_protocols())
print("Open Ports: ", scanner[ip_addr]['tcp'].keys())
# If user's input is 2, perform a UDP Scan
elif response == '2':
# Here, v is used for verbose, which means if selected it will give #extra information
# 1-1024 means the port number we want to search on
#-sU means perform a UDP SYN connect scan, it send the SYN packets to #the host
print("Nmap Version: ", scanner.nmap_version())
scanner.scan(ip_addr, '1-1024', '-v -sU')
print(scanner.scaninfo())
# state() tells if target is up or down
print("Ip Status: ", scanner[ip_addr].state())
# all_protocols() tells which protocols are enabled like TCP UDP etc
print("protocols:",scanner[ip_addr].all_protocols())
print("Open Ports: ", scanner[ip_addr]['udp'].keys())
# If user's input is 3, perform a Comprehensive scan
elif response == '3':
print("Nmap Version: ", scanner.nmap_version())
# sS for SYN scan, sv probe open ports to determine what service and version they are running on
# O determine OS type, A tells Nmap to make an effort in identifying the target OS
scanner.scan(ip_addr, '1-1024', '-v -sS -sV -sC -A -O')
print(scanner.scaninfo())
print("Ip Status: ", scanner[ip_addr].state())
print(scanner[ip_addr].all_protocols())
print("Open Ports: ", scanner[ip_addr]['tcp'].keys())
# If user's input is 4, perform a Regular Scan
elif response == '4':
# Works on default arguments
scanner.scan(ip_addr)
print(scanner.scaninfo())
print("Ip Status: ", scanner[ip_addr].state())
print(scanner[ip_addr].all_protocols())
print("Open Ports: ", scanner[ip_addr]['tcp'].keys())
elif response == '5':
print(scanner.scan("127.0.0.1", arguments="-O")['scan']['127.0.0.1']['osmatch'][1])
elif response == '6':
ip_addr = input()
print("Nmap Version: ", scanner.nmap_version())
# Here, v is used for verbose, which means if selected it will give extra information
# 1-1024 means the port number we want to search on
#-sS means perform a TCP SYN connect scan, it send the SYN packets to the host
scanner.scan(ip_addr,'1-1024', '-v -sS')
print(scanner.scaninfo())
# state() tells if target is up or down
print("Ip Status: ", scanner[ip_addr].state())
# all_protocols() tells which protocols are enabled like TCP UDP etc
print("protocols:",scanner[ip_addr].all_protocols())
print("Open Ports: ", scanner[ip_addr]['tcp'].keys())
elif response == '7':
scanner.scan(hosts='192.168.1.0/24', arguments='-n -sP -PE -PA21,23,80,3389')
hosts_list = [(x, scanner[x]['status']['state']) for x in scanner.all_hosts()]
for host, status in hosts_list:
print('{0}:{1}'.format(host, status))
else:
print("Please choose a number from the options above")
Thoughtful Tortoise