Advertisement
opexxx

lazymap.sh

May 6th, 2014
264
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 24.16 KB | None | 0 0
  1. #!/usr/bin/env bash
  2. # LazyMap
  3. # Daniel Compton
  4. # www.commonexploits.com
  5. # Twitter = @commonexploits
  6. # 19/12/2012
  7. # Tested on Bactrack 5 only.
  8.  
  9. # Import info - read first!
  10.  
  11. # Nmap Lazy Script - For Internal Inf Testing. tested only on BT5 gnome. Scans should launch 4x terminals at once, may only work on BT5!
  12. #
  13. # For the auto creation of a custom Nessus policy - export and place one policy file within the same directory as the script with any filename or extension - it will find it use this as a template.
  14. # For Nessus template use ensure the following options are set UDP SCAN=ON, SNMP SCAN=ON, SYN SCAN=ON,  PING HOST=OFF, TCP SCAN=OFF - the script will enable safe checks and consider unscanned ports as closed - double check before scanning.
  15.  
  16.  
  17. #####################################################################################
  18. # Released as open source by NCC Group Plc - http://www.nccgroup.com/
  19.  
  20. # Developed by Daniel Compton, daniel dot compton at nccgroup dot com
  21.  
  22. # https://github.com/nccgroup/vlan-hopping
  23.  
  24. #Released under AGPL see LICENSE for more information
  25.  
  26. ######################################################################################
  27.  
  28.  
  29.  
  30.  
  31. VERSION="1.8"
  32.  
  33. #####################################################################################################################
  34.  
  35. # User config options
  36.  
  37. # Turn on/off Nmap scan options
  38.  
  39. FULLTCP="on" # to disable/enable Full TCP Scan set to "off" / "on"
  40. SCRIPT="on" # to disable/enable safe script Scan set to "off" / "on"
  41. QUICKUDP="on" # to disable/enable quick UDP scan set to "off" / "on"
  42. COMMONTCP="on" # to disable/enabke commong TCP scan set to "off" / "on"
  43.  
  44. ######################################################################################################################
  45. # Script Starts
  46.  
  47. clear
  48. echo -e "\e[00;32m#############################################################\e[00m"
  49. echo ""
  50. echo "***   Lazymap - Internal Auto Nmap Script Version $VERSION  ***"
  51. echo ""
  52. echo -e "\e[00;32m#############################################################\e[00m"
  53. echo ""
  54. echo ""
  55. echo -e "\e[1;33mIf any of the scans are too slow, press Ctrl c to auto switch to a T5 scans\e[00m"
  56. echo ""
  57. echo -e "\e[1;33mIt can auto create you a custom Nessus policy based on only the unique open ports for faster scanning - see script header for details\e[00m"
  58. echo ""
  59. echo -e "\e[1;33mAll output including hosts up, down, unique ports and an audit of each scan start stop times can be found in the output directory.\e[00m"
  60. echo ""
  61. echo -e "\e[1;33mPress Enter to continue\e[00m"
  62. echo ""
  63. read ENTERKEY
  64. clear
  65. #Check for multiple Nessus policy files
  66. NESSUSPOLICYNO=$(grep -l --exclude=\*.sh -i "<NessusClientData_v2>" * |wc -l)
  67. if [ $NESSUSPOLICYNO -gt 1 ]
  68.     then
  69.         echo ""
  70.         echo -e "\e[1;31mI found more than 1 .nessus policy file template. Please correct this and run again!\e[00m"
  71.         echo ""
  72.         DOTNESSUS=$(grep -l --exclude=\*.sh -i "<NessusClientData_v2>" *)
  73.         echo -e "\e[00;31m$DOTNESSUS\e[00m"
  74.         echo ""
  75.         exit 1
  76.     else
  77.         echo ""
  78. fi
  79. echo -e "\e[1;33m----------------------------------------\e[00m"
  80. echo "The following Interfaces are available"
  81. echo -e "\e[1;33m----------------------------------------\e[00m"
  82.  
  83.     ifconfig | grep -o "eth.*" |cut -d " " -f1
  84. echo -e "\e[1;31m--------------------------------------------------\e[00m"
  85. echo "Enter the interface to scan from as the source"
  86. echo -e "\e[1;31m--------------------------------------------------\e[00m"
  87. read INT
  88.  
  89. ifconfig | grep -i -w $INT >/dev/null
  90.  
  91. if [ $? = 1 ]
  92.     then
  93.         echo ""
  94.         echo -e "\e[1;31mSorry the interface you entered does not exist! - check and try again.\e[00m"
  95.         echo ""
  96.         exit 1
  97. else
  98. echo ""
  99. fi
  100. LOCAL=$(ifconfig $INT |grep "inet addr:" |cut -d ":" -f 2 |awk '{ print $1 }')
  101. MASK=$(ifconfig |grep -i $LOCAL | grep -i mask: |cut -d ":" -f 4)
  102. clear
  103. echo ""
  104. echo -e "Your source IP address is set as follows \e[1;33m"$LOCAL"\e[00m with the mask of \e[1;33m"$MASK"\e[00m"
  105. echo ""
  106. ifconfig $INT |grep "inet addr:" |grep "192.168.186.*" >/dev/null 2>&1
  107. if [ $? = 0 ]
  108.     then
  109.         echo -e "\e[1;31mIt seems you are running in VMWARE with a NAT network connection.\e[00m"
  110.         echo ""
  111.         echo -e "\e[1;33mIf you intend to scan from a static IP you should set the NIC to BRIDGED mode, script will continue but CTRL C to quit and change if required.\e[00m"
  112.         echo ""
  113.         sleep 5
  114.     else
  115. echo ""
  116. fi
  117. echo -e "\e[1;31m---------------------------------------------------------------------------------------------------\e[00m"
  118. echo "Would you like to change your source IP address or gateway..? - Enter yes or no and press ENTER"
  119. echo -e "\e[1;31m---------------------------------------------------------------------------------------------------\e[00m"
  120. read IPANSWER
  121. if [ $IPANSWER = yes ]
  122.     then
  123.         echo ""
  124.         echo -e "\e[1;31m-----------------------------------------------------------------------------------------------------------\e[00m"
  125.         echo "Enter the IP address/subnet for the source interface you want to set. i.e 192.168.1.1/24 and press ENTER"
  126.         echo -e "\e[1;31m-----------------------------------------------------------------------------------------------------------\e[00m"
  127.         read SETIPINT
  128.         ifconfig $INT $SETIPINT up
  129.         SETLOCAL=`ifconfig $INT |grep "inet addr:" |cut -d ":" -f 2 |awk '{ print $1 }'`
  130.         SETMASK=`ifconfig |grep -i $SETLOCAL | grep -i mask: |cut -d ":" -f 4`
  131.         echo ""
  132.         echo -e "Your source IP address is set as follows \e[1;33m"$SETLOCAL"\e[00m with the mask of \e[1;33m"$SETMASK"\e[00m"
  133.         echo ""
  134.         echo -e "\e[1;31m----------------------------------------------------------------------------------------\e[00m"
  135.         echo "Would you like to change your default gateway..? - Enter yes or no and press ENTER"
  136.         echo -e "\e[1;31m----------------------------------------------------------------------------------------\e[00m"
  137.         read GATEWAYANSWER
  138.             if [ $GATEWAYANSWER = yes ]
  139.         then
  140.         echo ""
  141.         echo -e "\e[1;31m--------------------------------------------------------\e[00m"
  142.         echo "Enter the default gateway you want set and press ENTER"
  143.         echo -e "\e[1;31m--------------------------------------------------------\e[00m"
  144.         read SETGATEWAY
  145.         route add default gw $SETGATEWAY
  146.         echo ""
  147.         clear
  148.         echo ""
  149.         echo "The default gateway has been added below"
  150.         echo ""
  151.         ROUTEGW=`route |grep -i default`
  152.         echo -e "\e[1;33m$ROUTEGW\e[00m"
  153.         echo ""
  154.     else
  155. echo ""
  156.     fi
  157. fi
  158. echo -e "\e[1;31m--------------------------------------------------\e[00m"
  159. echo "Enter the reference or client name for the scan"
  160. echo -e "\e[1;31m--------------------------------------------------\e[00m"
  161. read REF
  162. echo ""
  163. echo -e "\e[1;31m-------------------------------------------------------------------\e[00m"
  164. echo "Enter the IP address/Range or the exact path to an input file"
  165. echo -e "\e[1;31m-------------------------------------------------------------------\e[00m"
  166. read RANGE
  167.  
  168. mkdir "$REF" >/dev/null 2>&1
  169. cd "$REF"
  170. echo "$REF" > REF
  171. echo "$INT" > INT
  172. echo ""
  173. echo -e "\e[1;31m-----------------------------------------------------------------------------------------------------------\e[00m"
  174. echo "Do you want to exclude any IPs from the scan i.e your Windows host? - Enter yes or no and press ENTER"
  175. echo -e "\e[1;31m-----------------------------------------------------------------------------------------------------------\e[00m"
  176. read EXCLUDEANS
  177.  
  178. if [ $EXCLUDEANS = yes ]
  179.         then
  180.             echo ""
  181.             echo -e "\e[1;31m------------------------------------------------------------------------------------------\e[00m"
  182.             echo "Enter the IP addresses to exclude i.e 192.168.1.1, 192.168.1.1-10 - normal nmap format"
  183.             echo -e "\e[1;31m------------------------------------------------------------------------------------------\e[00m"
  184.             read EXCLUDEDIPS
  185.             EXCLUDE="--exclude "$EXCLUDEDIPS""
  186.             echo "$EXCLUDE" > excludetmp
  187.             echo "This following IP addresses were asked to be excluded from the scan = "$EXCLUDEDIPS"" > "$REF"_nmap_hosts_excluded.txt
  188.         else
  189.             EXCLUDE=""
  190.             echo "$EXCLUDE" > excludetmp
  191.         fi
  192.  
  193.         echo $RANGE |grep "[0-9]" >/dev/null 2>&1
  194. if [ $? = 0 ]
  195.     then
  196.         echo ""
  197.         echo -e "\e[1;33mYou enterted a manual IP or range, scan will now start...\e[00m"
  198.         echo ""
  199.         echo -e "\e[1;33m$REF - Finding Live hosts via $INT, please wait...\e[00m"
  200.         nmap -e $INT -sP $EXCLUDE -PE -PM -PS21,22,23,25,26,53,80,81,110,111,113,135,139,143,179,199,443,445,465,514,548,554,587,993,995,1025,1026,1433,1720,1723,2000,2001,3306,3389,5060,5900,6001,8000,8080,8443,8888,10000,32768,49152 -PA21,80,443,13306 -vvv -oA "$REF"_nmap_PingScan $RANGE >/dev/null
  201.         cat "$REF"_nmap_PingScan.gnmap |grep "Up" |awk '{print $2}' > "$REF"_hosts_Up.txt
  202.         cat "$REF"_nmap_PingScan.gnmap | grep  "Down" |awk '{print $2}' > "$REF"_hosts_Down.txt
  203.     else
  204.         echo ""
  205.         echo -e "\e[1;33mYou entered a file as the input, I will just check I can read it ok...\e[00m"
  206.         cat $RANGE >/dev/null 2>&1
  207.             if [ $? = 1 ]
  208.             then
  209.                 echo ""
  210.                 echo -e "\e[1;31mSorry I can't read that file, check the path and try again!\e[00m"
  211.                 echo ""
  212.             exit 1
  213.         else
  214.             echo ""
  215.             echo -e "\e[1;33mI can read the input file ok, Scan will now start...\e[00m"
  216.             echo ""
  217.             echo -e "\e[1;33m$REF - Finding Live hosts via $INT, please wait...\e[00m"
  218.             nmap -e $INT -sP $EXCLUDE -PE -PM -PS21,22,23,25,26,53,80,81,110,111,113,135,139,143,179,199,443,445,465,514,548,554,587,993,995,1025,1026,1433,1720,1723,2000,2001,3306,3389,5060,5900,6001,8000,8080,8443,8888,10000,32768,49152 -PA21,80,443,13306 -vvv -oA "$REF"_nmap_PingScan -iL $RANGE >/dev/null
  219.             cat "$REF"_nmap_PingScan.gnmap |grep "Up" |awk '{print $2}' > "$REF"_hosts_Up.txt
  220.             cat "$REF"_nmap_PingScan.gnmap | grep  "Down" |awk '{print $2}' > "$REF"_hosts_Down.txt
  221.         fi
  222. fi
  223. clear
  224. HOSTSCOUNT=$(cat "$REF"_hosts_Up.txt |wc -l)
  225. HOSTSUPCHK=$(cat "$REF"_hosts_Up.txt)
  226. if [ -z "$HOSTSUPCHK" ]
  227.     then
  228.         echo ""
  229.         echo -e "\e[1;33mIt seems there are no live hosts present in the range specified..I will run a Arp-scan to double check...\e[00m"
  230.         echo ""
  231.         sleep 4
  232.         arp-scan --interface $INT --file "$REF"_hosts_Down.txt > "$REF"_arp_scan.txt 2>&1
  233.         arp-scan --interface $INT --file "$REF"_hosts_Down.txt |grep -i "0 responded" >/dev/null 2>&1
  234.             if [ $? = 0 ]
  235.                 then
  236.                     echo -e "\e[1;31mNo live hosts were found using arp-scan - check IP range/source address and try again. It may be there are no live hosts.\e[00m"
  237.                     echo ""
  238.                     rm "INT" 2>&1 >/dev/null
  239.                     rm "REF" 2>&1 >/dev/null
  240.                     rm "excludetmp" 2>&1 >/dev/null
  241.                     touch "$REF"_no_live_hosts.txt
  242.                     exit 1
  243.             else
  244.                     arp-scan --interface $INT --file "$REF"_hosts_Down.txt > "$REF"_arp_scan.txt 2>&1
  245.                     ARPUP=$(cat "$REF"_arp_scan.txt)
  246.                     echo ""
  247.                     echo -e "\e[1;33mNmap didn't find any live hosts, but apr-scan found the following hosts within the range...script will exit. Try adding these to the host list to scan.\e[00m"
  248.                     echo ""
  249.                     rm "INT" 2>&1 >/dev/null
  250.                     rm "REF" 2>&1 >/dev/null
  251.                     rm "excludetmp" 2>&1 >/dev/null
  252.                     echo -e "\e[00;32m$ARPUP\e[00m"
  253.                     echo ""
  254.                     exit 1
  255.     fi
  256. fi
  257. echo -e "\e[1;33m-----------------------------------------------------------------\e[00m"
  258. echo "The following $HOSTSCOUNT hosts were found up for $REF"
  259. echo -e "\e[1;33m-----------------------------------------------------------------\e[00m"
  260. HOSTSUP=$(cat "$REF"_hosts_Up.txt)
  261. echo -e "\e[00;32m$HOSTSUP\e[00m"
  262. echo ""
  263. echo -e "\e[1;33mPress Enter to scan the live hosts, or CTRL C to cancel\e[00m"
  264. read ENTER
  265.  
  266. if [ $COMMONTCP = "on" ]
  267. then
  268. # Scanning Common TCP Ports - CTRL - C if slow to switch to T5 fast
  269. gnome-terminal --title="$REF - Common TCP Port Scan - $INT" -x bash -c 'REF=$(cat REF);INT=$(cat INT);EXCLUDE=$(cat excludetmp);trap control_c SIGINT; control_c() { clear ; echo "" ; echo "" ; echo -e "\e[1;33mYou interupted the Common TCP Scan for "$REF" - it was probably too slow..? I will run it again with T5..please wait..\e[00m" ; echo "" ; sleep 3 ; echo -e "\e[1;33mCleaning up T4 Common TCP scan files..\e[00m" ; sleep 3 ; rm "$REF"_nmap_CommonPorts* >/dev/null ; clear ; echo "" ; echo -e "\e[1;33mNow Starting Common TCP scan with T5 option..."$REF"\e[00m" ; echo "" ; nmap -e $INT -sS $EXCLUDE -PN -T5 -sV --version-intensity 1 -vvv -oA "$REF"_nmap_CommonPorts -iL "$REF"_hosts_Up.txt -n ; echo "" ; echo -e "\e[00;32m$REF - Common TCP Port Scan Complete, Press ENTER to Exit" ; echo "" ; read ENTERKEY ; exit $? ; } ; echo "" ; echo -e "\e[1;33mStarting Common TCP scan for $REF\e[00m"; echo "" ;  echo -e "\e[1;33mIf the scan runs too slow, just press CTRL C to switch to a T5 speed scan\e[00m" ; echo "" ; sleep 3 ; nmap -e $INT -sS $EXCLUDE -PN -T4 -sV --version-intensity 1 -vvv -oA "$REF"_nmap_CommonPorts -iL "$REF"_hosts_Up.txt -n ; echo "" ; echo -e "\e[00;32m$REF - Common TCP Port Scan Complete, Press ENTER to Exit" ; echo "" ; read ENTERKEY ;'
  270. else
  271. echo "Skipping Common TCP scan as turned off in options"
  272. fi
  273.  
  274. if [ $SCRIPT = "on" ]
  275. then
  276. #Script Scan (not CTRL C option)
  277. gnome-terminal --title="$REF - Script Scan - $INT" -x bash -c 'REF=$(cat REF);INT=$(cat INT);EXCLUDE=$(cat excludetmp);nmap -e $INT -PN $EXCLUDE -A -vvv -oA "$REF"_nmap_ScriptScan -iL "$REF"_hosts_Up.txt -n; echo ""; echo -e "\e[00;32m$REF - Script Scan Complete, Press ENTER to Exit";echo "";read ENTERKEY;'
  278. else
  279. echo "Skipping Script Scan as turned off in options"
  280. fi
  281.  
  282. if [ $QUICKUDP = "on" ]
  283. then
  284. #Scanning Quick UDP (1,000) Ports - CTRL - C if slow to switch to T5 fast
  285. gnome-terminal --title="$REF - Quick UDP Port Scan - $INT" -x bash -c 'REF=$(cat REF);INT=$(cat INT);EXCLUDE=$(cat excludetmp);trap control_c SIGINT; control_c() { clear ; echo "" ; echo "" ; echo -e "\e[1;33mYou interupted the Quick UDP Scan for "$REF" - it was probably too slow..? I will run it again with T5..please wait..\e[00m" ; echo "" ; sleep 3 ; echo -e "\e[1;33mCleaning up T4 Quick UDP scan files..\e[00m" ; sleep 3 ; rm "$REF"_nmap_QuickUDP* >/dev/null ; clear ; echo "" ; echo -e "\e[1;33mNow Starting Quick UDP scan with T5 option..."$REF"\e[00m" ; echo "" ; nmap -e $INT -sU $EXCLUDE -Pn -T5 -vvv -oA "$REF"_nmap_QuickUDP -iL "$REF"_hosts_Up.txt -n ; echo "" ; echo -e "\e[00;32m$REF - Quick UDP Scan Complete, Press ENTER to Exit" ; echo "" ; read ENTERKEY ; exit $? ; } ; echo "" ; echo -e "\e[1;33mStarting Quick UDP scan for $REF\e[00m"; echo "" ;  echo -e "\e[1;33mIf the scan runs too slow, just press CTRL C to switch to a T5 speed scan\e[00m" ; echo "" ; sleep 3 ; nmap -e $INT -sU $EXCLUDE -Pn -T4 -vvv -oA "$REF"_nmap_QuickUDP -iL "$REF"_hosts_Up.txt -n ; echo "" ; echo -e "\e[00;32m$REF - Quick UDP Port Scan Complete, Press ENTER to Exit" ; echo "" ; read ENTERKEY ;'
  286. else
  287. echo "Skipping Quick UDP Scan as turned off in options"
  288. fi
  289.  
  290. if [ $FULLTCP = "on" ]
  291. then
  292. # Scanning Full TCP Ports - CTRL - C if slow to switch to T5 fast
  293. gnome-terminal --title="$REF - Full TCP Port Scan - $INT" -x bash -c 'REF=$(cat REF);INT=$(cat INT);EXCLUDE=$(cat excludetmp);trap control_c SIGINT; control_c() { clear ; echo "" ; echo "" ; echo -e "\e[1;33mYou interupted the Full TCP Scan for "$REF" - it was probably too slow..? I will run it again with T5..please wait..\e[00m" ; echo "" ; sleep 3 ; echo -e "\e[1;33mCleaning up T4 Full TCP scan files..\e[00m" ; sleep 3 ; rm "$REF"_nmap_FullPorts* >/dev/null ; clear ; echo "" ; echo -e "\e[1;33mNow Starting Full TCP scan with T5 option..."$REF"\e[00m" ; echo "" ; nmap -e $INT -sS $EXCLUDE -PN -T5 -p- -sV --version-intensity 1 -vvv -oA "$REF"_nmap_FullPorts -iL "$REF"_hosts_Up.txt -n ; echo "" ; echo -e "\e[00;32m$REF - Full TCP Port Scan Complete, Press ENTER to Exit" ; echo "" ; read ENTERKEY ; exit $? ; } ; echo "" ; echo -e "\e[1;33mStarting Full TCP scan for $REF\e[00m"; echo "" ;  echo -e "\e[1;33mIf the scan runs too slow, just press CTRL C to switch to a T5 speed scan\e[00m" ; echo "" ; sleep 3 ; nmap -e $INT -sS $EXCLUDE -PN -T4 -p- -sV --version-intensity 1 -vvv -oA "$REF"_nmap_FullPorts -iL "$REF"_hosts_Up.txt -n ; echo "" ; echo -e "\e[00;32m$REF - Full TCP Port Scan Complete, Press ENTER to Exit" ; echo "" ; read ENTERKEY ;'
  294. else
  295. echo "Skipping Full TCP as turned off in options"
  296. fi
  297.  
  298. #clear temp files
  299. sleep 5
  300. rm "INT" 2>&1 >/dev/null
  301. rm "REF" 2>&1 >/dev/null
  302. rm "excludetmp" 2>&1 >/dev/null
  303.  
  304. clear
  305. echo ""
  306. echo -e "\e[1;33mOnce all scans are complete, press ENTER to list all unique ports found - $REF\e[00m"
  307. read ENTERKEY
  308. clear
  309. echo ""
  310. echo -e "\e[1;33m----------------------------------------------------------------------------------\e[00m"
  311. echo "The following scan start/finish times were recorded for $REF"
  312. echo -e "\e[1;33m----------------------------------------------------------------------------------\e[00m"
  313. echo ""
  314. PINGTIMESTART=`cat "$REF"_nmap_PingScan.nmap |grep -i "scan initiated" | awk '{ print $6 ,$7 ,$8, $9, $10}'`
  315. PINGTIMESTOP=`cat "$REF"_nmap_PingScan.nmap |grep -i "nmap done" | awk '{ print $5, $6 ,$7 , $8, $9}'`
  316. COMMONTCPTIMESTART=`cat "$REF"_nmap_CommonPorts.nmap |grep -i "scan initiated" | awk '{ print $6 ,$7 ,$8, $9, $10}'`
  317. COMMONTCPTIMESTOP=`cat "$REF"_nmap_CommonPorts.nmap |grep -i "nmap done" | awk '{ print $5, $6 ,$7 , $8, $9}'`
  318. FULLTCPTIMESTART=`cat "$REF"_nmap_FullPorts.nmap |grep -i "scan initiated" | awk '{ print $6 ,$7 ,$8, $9, $10}'`
  319. FULLTCPTIMESTOP=`cat "$REF"_nmap_FullPorts.nmap |grep -i "nmap done" | awk '{ print $5, $6 ,$7 , $8, $9}'`
  320. QUICKUDPTIMESTART=`cat "$REF"_nmap_QuickUDP.nmap |grep -i "scan initiated" | awk '{ print $6 ,$7 ,$8, $9, $10}'`
  321. QUICKUDPTIMESTOP=`cat "$REF"_nmap_QuickUDP.nmap |grep -i "nmap done" | awk '{ print $5, $6 ,$7 , $8, $9}'`
  322. SCRIPTTIMESTART=`cat "$REF"_nmap_ScriptScan.nmap |grep -i "scan initiated" | awk '{ print $6 ,$7 ,$8, $9, $10}'`
  323. SCRIPTTIMESTOP=`cat "$REF"_nmap_ScriptScan.nmap |grep -i "nmap done" | awk '{ print $5, $6 ,$7 , $8, $9}'`
  324.  
  325. if [ -z "$PINGTIMESTOP" ]
  326.     then
  327.         echo ""
  328.         echo "" >> "$REF"_nmap_scan_times.txt
  329.         echo -e "\e[1;33mPing sweep started $PINGTIMESTART\e[00m - \e[1;31mscan did not complete or was interupted!\e[00m"
  330.         echo "Ping sweep started $PINGTIMESTART - scan did not complete or was interupted!" >> "$REF"_nmap_scan_times.txt
  331.     else
  332.         echo ""
  333.         echo "" >> "$REF"_nmap_scan_times.txt
  334.         echo -e "\e[1;33mPing sweep started $PINGTIMESTART\e[00m - \e[00;32mfinished successfully $PINGTIMESTOP\e[00m"
  335.         echo "Ping sweep started $PINGTIMESTART - finsihed successfully $PINGTIMESTOP" >> "$REF"_nmap_scan_times.txt
  336. fi
  337. if [ -z "$COMMONTCPTIMESTOP" ]
  338.     then
  339.         echo ""
  340.         echo "" >> "$REF"_nmap_scan_times.txt
  341.         echo -e "\e[1;33mCommon TCP scan started $COMMONTCPTIMESTART\e[00m - \e[1;31mscan did not complete or was interupted!\e[00m"
  342.         echo "Common TCP scan started $COMMONTCPTIMESTART - scan did not complete or was interupted!" >> "$REF"_nmap_scan_times.txt
  343.     else
  344.         echo ""
  345.         echo "" >> "$REF"_nmap_scan_times.txt
  346.         echo -e "\e[1;33mCommon TCP scan started $COMMONTCPTIMESTART\e[00m - \e[00;32mfinished successfully $COMMONTCPTIMESTOP\e[00m"
  347.         echo "Common TCP scan started $COMMONTCPTIMESTART - finished successfully $COMMONTCPTIMESTOP" >> "$REF"_nmap_scan_times.txt
  348. fi
  349. if [ -z "$FULLTCPTIMESTOP" ]
  350.     then
  351.         echo ""
  352.         echo "" >> "$REF"_nmap_scan_times.txt
  353.         echo -e "\e[1;33mFull TCP scan started $FULLTCPTIMESTART\e[00m - \e[1;31mscan did not complete or was interupted!\e[00m"
  354.         echo "Full TCP scan started $FULLTCPTIMESTART - scan did not complete or was interupted!" >> "$REF"_nmap_scan_times.txt
  355.     else
  356.         echo ""
  357.         echo "" >> "$REF"_nmap_scan_times.txt
  358.         echo -e "\e[1;33mFull TCP scan started $FULLTCPTIMESTART\e[00m - \e[00;32mfinished successfully $FULLTCPTIMESTOP\e[00m"
  359.         echo "Full TCP scan started $FULLTCPTIMESTART - finished successfully $FULLTCPTIMESTOP" >> "$REF"_nmap_scan_times.txt
  360. fi
  361. if [ -z "$QUICKUDPTIMESTOP" ]
  362.     then
  363.         echo ""
  364.         echo "" >> "$REF"_nmap_scan_times.txt
  365.         echo -e "\e[1;33mQuick UDP scan started $QUICKUDPTIMESTART\e[00m - \e[1;31mscan did not complete or was interupted!\e[00m"
  366.         echo "Quick UDP scan started $QUICKUDPTIMESTART - scan did not complete or was interupted!" >> "$REF"_nmap_scan_times.txt
  367.     else
  368.         echo ""
  369.         echo "" >> "$REF"_nmap_scan_times.txt
  370.         echo -e "\e[1;33mQuick UDP scan started $QUICKUDPTIMESTART\e[00m - \e[00;32mfinished successfully $QUICKUDPTIMESTOP\e[00m"
  371.         echo "Quick UDP scan started $QUICKUDPTIMESTART - finished successfully $QUICKUDPTIMESTOP" >> "$REF"_nmap_scan_times.txt
  372. fi
  373. if [ -z "$SCRIPTTIMESTOP" ]
  374.     then
  375.         echo ""
  376.         echo "" >> "$REF"_nmap_scan_times.txt
  377.         echo -e "\e[1;33mScript scan started $SCRIPTTIMESTART\e[00m - \e[1;31mscan did not complete or was interupted!\e[00m"
  378.         echo "Script scan started $SCRIPTTIMESTART - scan did not complete or was interupted!" >> "$REF"_nmap_scan_times.txt
  379.     else
  380.         echo ""
  381.         echo "" >> "$REF"_nmap_scan_times.txt
  382.         echo -e "\e[1;33mScript scan started $SCRIPTTIMESTART\e[00m - \e[00;32mfinished successfully $SCRIPTTIMESTOP\e[00m"
  383.         echo "Script scan started $SCRIPTTIMESTART - finished successfully $SCRIPTTIMESTOP" >> "$REF"_nmap_scan_times.txt
  384. fi
  385. echo ""
  386. echo -e "\e[1;33m------------------------------------------------------------------\e[00m"
  387. echo "Unique TCP and UDP Port Summary - $REF"
  388. echo -e "\e[1;33m------------------------------------------------------------------\e[00m"
  389. UNIQUE=$(cat *.xml |grep -i 'open"' |grep -i "portid=" |cut -d '"' -f 4,5,6| grep -o '[0-9]*' |sort --unique |paste -s -d,)
  390. echo $UNIQUE >"$REF"_nmap_unique_ports.txt
  391. echo -e "\e[00;32m$UNIQUE\e[00m"
  392. echo ""
  393. echo -e "\e[1;33m-----------------------------------------------------------------------\e[00m"
  394. echo "The following $HOSTSCOUNT hosts were up and scanned for $REF"
  395. echo -e "\e[1;33m-----------------------------------------------------------------------\e[00m"
  396. HOSTSUP=$(cat "$REF"_hosts_Up.txt)
  397. echo -e "\e[00;32m$HOSTSUP\e[00m"
  398. echo ""
  399. echo ""
  400. #Check for excluded IPs
  401. ls "$REF"_nmap_hosts_excluded.txt >/dev/null 2>&1
  402. if [ $? = 0 ]
  403.     then
  404.         echo -e "\e[1;33m--------------------------------------------------------------------------------\e[00m"
  405.         echo "The following hosts were requested to be excluded from scans for $REF"
  406.         echo -e "\e[1;33m---------------------------------------------------------------------------------\e[00m"
  407.         echo -e "\e[00;32m$EXCLUDEDIPS\e[00m"
  408.         echo ""
  409.     else
  410.     echo ""
  411. fi
  412. echo -e "\e[1;33mOutput files have all been saved to the\e[00m \e[00;32m"$REF"\e[00m \e[1;33mdirectory\e[00m"
  413. echo ""
  414.  
  415. # check for Nessus template
  416. POLICYNAME=$(grep -l --exclude=\*.sh -i "<NessusClientData_v2>" ../*) #default Nessus template - save just one template with any extenstion - must be within script directory
  417. ls "$POLICYNAME" >/dev/null 2>&1
  418. if [ $? = 0 ]
  419.     then
  420.     FINDPOLICY=$(cat $POLICYNAME |grep policyName) #find Nessus policy name
  421.     NEWPOLICY="<Policy><policyName>$REF</policyName>" #set Nessus policy name
  422.     NEWPORTS="<value>$UNIQUE</value>" #set Nessus policy unique tcp/udp ports
  423.     FINDCOMMENTS=$(cat $POLICYNAME |grep policyComments) #find nessus comment value
  424.     NEWCOMMENTS="<policyComments>"$REF" Custom Scan of the following unique ports "$UNIQUE"</policyComments>" #Add Nessus policy comments
  425.     ENABLESAFE="<value>yes</value>" #enable Nessus safe checks only - wont run DoS plugins
  426.     ENABLECLOSED="<value>yes</value>" #set Nessus consider unscanned ports closed - scans only unqiue ports
  427.     OFFSTOP="<value>no</value>" #set Nessus to disable stop scan on disconnect
  428.     # Create custom Nessus Policy
  429.     cat $POLICYNAME | sed "s#$FINDPOLICY#$NEWPOLICY#" |sed "s#$FINDCOMMENTS#$NEWCOMMENTS#"  >"$REF"_nessus.policy
  430.     FINDPORTS=$(cat $POLICYNAME |awk '/port_range/{getline; print NR}') #find ports
  431.     FINDSAFE=$(cat $POLICYNAME | awk '/safe_checks/{getline; print NR}') #find Nessus safe check value
  432.     FINDCLOSED=$(cat $POLICYNAME |awk '/unscanned_closed/{getline; print NR}') # find consider unclosed ports closed
  433.     FINDSTOP=$(cat $POLICYNAME |awk '/stop_scan_on_disconnect/{getline; print NR}') #find stop scan on disconnect
  434.     sed -i "$FINDPORTS"i"$NEWPORTS" "$REF"_nessus.policy
  435.     sed -i "$FINDSAFE"i"$ENABLESAFE" "$REF"_nessus.policy
  436.     sed -i "$FINDCLOSED"i"$ENABLECLOSED" "$REF"_nessus.policy
  437.     sed -i "$FINDSTOP"i"$OFFSTOP" "$REF"_nessus.policy
  438.         echo ""
  439.         echo -e "\e[00;32mI have created a custom policy Nessus policy file named ""$REF"_nessus.policy" - Import this into Nessus for a faster custom scan just on the above live hosts\e[00m"
  440.         echo ""
  441.         echo -e "\e[1;33mRemember to export and update the Nessus template file regularly after updating Nessus to ensure the latest modules are included - ensure the correct options are enabled\e[00m"
  442.         echo ""
  443.     else
  444.     echo ""
  445. fi
  446. exit 0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement