Skip to main content

A comprehensive network reconnaissance tool

Project description

NETSCANNER

This project was created as part of my final year undergraduate development project for my Bachelor of Science degree.

This program will conduct a comprehensive scan of the local network and surrounding wireless networks using basic OS utilities, Nmap and airodump-ng.

Screenshots

Screenshot 1

Screenshot 2

Screenshot 3

Please note: A terminal window width of above 130 columns is recommended for the output to display correctly.

Usage

  python3 -m netscanner < -h | -nP | -w | -l | -hD >
  < --wP <integer value in seconds >
  < --pP <integer value in seconds> >
  < --pR <first port-last port> >

Requirements

  • python3: NETSCANNER was designed to work with Python 3.10.
  • ifconfig: For gathering statistical data on local interfaces.
  • ethtool: For gathering statistical data on local interfaces
  • iwconfig: For gathering statistical data on local wireless-capable interfaces.
  • airmon-ng: For enabling monitor mode on capable interfaces.
  • airodump-ng: For capturing 802.11 beacon frames.
  • Nmap: For conducting local network reconnaissance.

A monitor-mode capable wireless interface is also required if you wish to use the wireless network discovery feature. See here for more information on this.

Execution

Using PyPi

The preferred method of running the program is installing the Python package from PyPi directly.

  pip install netscanner

Then running the program:

  python3 -m netscanner <mode specification> <options>

Manually

You can also run the module itself by downloading the main.py module from this repository and running it.

  python3 __main__.py <mode specification> <options>

Avoiding sudo

The program runs shell commands with sudo privileges in the background which will require you to provide your sudo password frequently.

To avoid this append this line to your /etc/sudoers file using sudo visudo

# NETSCANNER PACKAGE
<USERNAME> ALL=(ALL) NOPASSWD: ALL

This will allow you to run the module without being asked for your sudo password. This is wholly option and it is recommended that you comment this line when done using the program.

Modes and Options

Modes

  • Mode 1
    • This mode will execute all functions of the program. If no flags are specified this will be the mode of operation.
  • Mode 2 (-nP)
    • This flag will execute Mode 2, NO PORT SCAN, which will execute the Host Discovery and 802.11 WLAN Discovery processes.
  • Mode 3 (-w)
    • This flag will execute Mode 3, WIRELESS ONLY, which will execute the 802.11 WLAN Discovery process exclusively.
  • Mode 4 (-l)
    • This flag will execute Mode 4, LOCAL SCAN ONLY, which will execute the Host Discovery and Port Scan processes.
  • Mode 5 (-hD)
    • This flag will execute Mode 5, HOST DISCOVERY ONLY, which will execute the Host Discovery Process exclusively.

Options

  • Wireless Scan Period (--wP)
    • This option allows you to specify a scan period for the 802.11 WLAN Discovery process. The default is 60. This value is ignored if the mode of operation is not Mode 1, 2 or 3. Large values will result in longer scan times but greater verbosity.
  • Port Scan Period (--pP)
    • This option allows you to specify a scan period for the Port Scan process. The default is 60. This value is ignored if the mode of operation is not Mode 1 or 4. Large values will result in longer scan times but greater verbosity.
  • Port Range (--pR)
    • This option allows you to specify a port range for the Port Scan process. The default is the 100 most common ports determined by Nmap (-F). Large values will result in longer scan times but greater verbosity. It is useful to combine this option with the --pP option to avoid scan timeouts when scanning large ranges.

Processes

This section provides a brief synopsis of each process used in the program. There are three processes that are used.

Host Discovery

This process gathers characteristics about the local network and hosts on the local network using ifconfig, iwconfig, ethtool. And the ARP Request Ping and rDNS Query Flood in Nmap.

Port Scan

By default, this process uses Nmap to determine the state of the 100 most used TCP and UDP ports (-F) on all active hosts on the local network using the TCP Half-Open Scan and the UDP Scan, port scanning techniques. The ports that are scanned can be changed using the --pR flag in the command line, to indicate a port range.

This process also has a default timeout period of 60 seconds which can be changed using the --pP flag.

Remote WLAN Discovery

This process determines the characteristics of remote wireless networks in the vicinity of the host machine if a wireless interface is present, available and capable of 802.11 monitor mode, using the 802.11 packet capture technique with airodump-ng.

The program will attempt to use airmon-ng to enable monitor mode on the interface. If this is is unsuccessful you will not see an error, the table for Remote WLAN data will simply be empty.

This process has a default timeout period of 60 seconds which can be changed using the --wP flag.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

netscanner-0.0.19.tar.gz (28.1 kB view details)

Uploaded Source

Built Distribution

netscanner-0.0.19-py2.py3-none-any.whl (26.9 kB view details)

Uploaded Python 2 Python 3

File details

Details for the file netscanner-0.0.19.tar.gz.

File metadata

  • Download URL: netscanner-0.0.19.tar.gz
  • Upload date:
  • Size: 28.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.3.1 CPython/3.10.7 Linux/5.19.0-31-generic

File hashes

Hashes for netscanner-0.0.19.tar.gz
Algorithm Hash digest
SHA256 1ab6a4fd9765a668388b7c80efcf4b966ecbfc2f8315618594286bb424ea5f79
MD5 3cdf9edd6f7b3f3283f07dc6082faf2c
BLAKE2b-256 645faf947c44afdad2b87ba858894e7c5b7980baef21c13d9a1fa2e6614a74fa

See more details on using hashes here.

Provenance

File details

Details for the file netscanner-0.0.19-py2.py3-none-any.whl.

File metadata

  • Download URL: netscanner-0.0.19-py2.py3-none-any.whl
  • Upload date:
  • Size: 26.9 kB
  • Tags: Python 2, Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.3.1 CPython/3.10.7 Linux/5.19.0-31-generic

File hashes

Hashes for netscanner-0.0.19-py2.py3-none-any.whl
Algorithm Hash digest
SHA256 1903c5ef49744678053327f491df8902b86e9f326e2d6e3a01ceaffe0795dd86
MD5 1762940cd0d1cbed0ebfcb18c260efb2
BLAKE2b-256 c19c31dc805e9d6c7caafca5bbe02cb426bcee801025d06b1fb1c089d5ad29d4

See more details on using hashes here.

Provenance

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page