This little script gets all DNS A records for a given zone via zone transfer (your machine must be allowed for it), gathers open ports via massscan and then fires up single nmap scans for version detection and scripts of the single hosts. The ports to scan are determined via the nmap-services file. The output is saved in various files and all NMAP xml outputs are stored in the results folder for further processing.
To configure the scan modify the provided scan.cfg.example
and pass it via the -c parameter
- Python3
- massscan
- nmap
./run.py -c scan.cfg
sudo setcap cap_net_raw,cap_net_admin,cap_net_bind_service+eip $(which nmap)
sudo setcap cap_net_raw,cap_net_admin,cap_net_bind_service+eip $(which masscan)