Advertisement
xosski

Network security toolkit

Jan 22nd, 2025
11
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.30 KB | None | 0 0
  1. #!/bin/bash
  2.  
  3. # Clear screen and display welcome banner
  4. clear
  5. cat << "EOF"
  6. \ | \ | \ _ \ __ ) | ____|
  7. \ | |\/ | _ \ | | __ \ __| | | __| _ \ | _ \ __| __| _ \ __|
  8. |\ |_____| | | ___ \ ___/ | | | | | | __/ __| ( | | ( __/ |
  9. _| \_| _| _|_/ _\_| ____/ _| \__,_|\__|\___|_| \___/ _| \___|\___|_| V. - 0.1
  10.  
  11. # Require root privileges
  12. if [ "$(id -u)" -ne 0 ]; then
  13. echo -e "\n[!] This script must be executed with root privileges.\n"
  14. exit 1
  15. fi
  16.  
  17. # Create a logs directory
  18. LOG_DIR="./logs"
  19. mkdir -p "$LOG_DIR"
  20.  
  21. # Menu Display
  22. while true; do
  23. clear
  24. echo -e "\nChoose an Option:"
  25. echo -e "1) FTP Brute-Force\n2) AFP Brute-Force\n3) Telnet Brute-Force\n4) SMTP Brute-Force"
  26. echo -e "5) AJP Brute-Force\n6) Cassandra Brute-Force\n7) Citrix Brute-Force\n8) CVS Brute-Force"
  27. echo -e "9) distcc CVE Scan\n10) DNS Brute-Force\n11) HTTP Brute-Force\n12) HTTP Form Brute-Force"
  28. echo -e "13) Vulnerability Scan\n14) Service Detection\n15) Batch Target Scan\n0) Exit"
  29. read -p "Enter Your Choice: " choice
  30.  
  31. case $choice in
  32. 0)
  33. echo "Exiting script. Goodbye!"
  34. break
  35. ;;
  36. 1)
  37. read -p "Enter Target: " target
  38. log_file="$LOG_DIR/ftp_brute_$(date +%F_%T).log"
  39. nmap -p 21 --script ftp-brute "$target" -d -oN "$log_file"
  40. echo "Results saved to $log_file"
  41. ;;
  42. 2)
  43. read -p "Enter Target: " target
  44. log_file="$LOG_DIR/afp_brute_$(date +%F_%T).log"
  45. nmap -p 548 --script afp-bruteforce "$target" -oN "$log_file"
  46. echo "Results saved to $log_file"
  47. ;;
  48. 3)
  49. read -p "Enter Target: " target
  50. log_file="$LOG_DIR/telnet_brute_$(date +%F_%T).log"
  51. nmap -p 23 --script telnet-brute "$target" -d -oN "$log_file"
  52. echo "Results saved to $log_file"
  53. ;;
  54. 4)
  55. read -p "Enter Target: " target
  56. log_file="$LOG_DIR/smtp_brute_$(date +%F_%T).log"
  57. nmap -p 25 --script smtp-brute "$target" -d -oN "$log_file"
  58. echo "Results saved to $log_file"
  59. ;;
  60. 5)
  61. read -p "Enter Target: " target
  62. log_file="$LOG_DIR/ajp_brute_$(date +%F_%T).log"
  63. nmap -p 8009 --script ajp-brute "$target" -oN "$log_file"
  64. echo "Results saved to $log_file"
  65. ;;
  66. 6)
  67. read -p "Enter Target: " target
  68. log_file="$LOG_DIR/cassandra_brute_$(date +%F_%T).log"
  69. nmap -p 9160 --script cassandra-brute "$target" -oN "$log_file"
  70. echo "Results saved to $log_file"
  71. ;;
  72. 7)
  73. read -p "Enter UserList File (userdb): " userdb
  74. read -p "Enter PasswordList File (passdb): " passdb
  75. read -p "Enter Domain Name (ntdomain): " ntdomain
  76. read -p "Enter Host: " host
  77. log_file="$LOG_DIR/citrix_brute_$(date +%F_%T).log"
  78. nmap --script citrix-brute-xml --script-args userdb="$userdb",passdb="$passdb",ntdomain="$ntdomain" -p 80,443,8080 "$host" -oN "$log_file"
  79. echo "Results saved to $log_file"
  80. ;;
  81. 8)
  82. read -p "Enter Host: " host
  83. log_file="$LOG_DIR/cvs_brute_$(date +%F_%T).log"
  84. nmap -p 2401 --script cvs-brute "$host" -oN "$log_file"
  85. echo "Results saved to $log_file"
  86. ;;
  87. 9)
  88. read -p "Enter Target: " target
  89. log_file="$LOG_DIR/distcc_cve_$(date +%F_%T).log"
  90. nmap -p 3632 "$target" --script distcc-exec --script-args "distcc-exec.cmd='id'" -oN "$log_file"
  91. echo "Results saved to $log_file"
  92. ;;
  93. 10)
  94. read -p "Enter Target: " target
  95. log_file="$LOG_DIR/dns_brute_$(date +%F_%T).log"
  96. nmap --script dns-brute "$target" -oN "$log_file"
  97. echo "Results saved to $log_file"
  98. ;;
  99. 11)
  100. read -p "Enter Host: " host
  101. log_file="$LOG_DIR/http_brute_$(date +%F_%T).log"
  102. nmap --script http-brute -p 80 "$host" -oN "$log_file"
  103. echo "Results saved to $log_file"
  104. ;;
  105. 12)
  106. read -p "Enter Host: " host
  107. log_file="$LOG_DIR/http_form_brute_$(date +%F_%T).log"
  108. nmap --script http-form-brute -p 80 "$host" -oN "$log_file"
  109. echo "Results saved to $log_file"
  110. ;;
  111. 13)
  112. read -p "Enter Target: " target
  113. log_file="$LOG_DIR/vulnerability_scan_$(date +%F_%T).log"
  114. nmap --script vuln "$target" -oN "$log_file"
  115. echo "Results saved to $log_file"
  116. ;;
  117. 14)
  118. read -p "Enter Target: " target
  119. log_file="$LOG_DIR/service_detection_$(date +%F_%T).log"
  120. nmap -sV "$target" -oN "$log_file"
  121. echo "Results saved to $log_file"
  122. ;;
  123. 15)
  124. read -p "Enter File Containing Targets (one per line): " target_file
  125. if [ -f "$target_file" ]; then
  126. log_file="$LOG_DIR/batch_scan_$(date +%F_%T).log"
  127. while IFS= read -r target; do
  128. echo "Scanning $target..."
  129. nmap -p 21 --script ftp-brute "$target" >>"$log_file"
  130. done <"$target_file"
  131. echo "Batch scan completed. Results saved to $log_file"
  132. else
  133. echo "File not found."
  134. fi
  135. ;;
  136. *)
  137. echo "Invalid Option. Try Again."
  138. ;;
  139. esac
  140. read -p "Press Enter to continue..."
  141. done
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement