Sniff-based Network Vulnerability Scanner
python3 Above.py --help
█████╗ ██████╗ ██████╗ ██╗ ██╗███████╗
██╔══██╗██╔══██╗██╔═══██╗██║ ██║██╔════╝
███████║██████╔╝██║ ██║██║ ██║█████╗
██╔══██║██╔══██╗██║ ██║╚██╗ ██╔╝██╔══╝
██║ ██║██████╔╝╚██████╔╝ ╚████╔╝ ███████╗
╚═╝ ╚═╝╚═════╝ ╚═════╝ ╚═══╝ ╚══════╝
Sniff-based Network Vulnerability Scanner
Author: Magama Bazarov, @in9uz, <in9uz@protonmail.com>
usage: Above.py [-h] --interface INTERFACE --timeout TIMEOUT
options:
-h, --help show this help message and exit
--interface INTERFACE
--timeout TIMEOUT
Calling functions by arguments.
This script is based on a sniff of network traffic. At the moment it supports the following protocols:
DTP (Dynamic Trunking Protocol)
CDP (Cisco Discovery Protocol)
LLDP (Link Layer Discovery Protocol)
OSPF (Open Shortest Path First)
EIGRP (Enhanced Interior Gateway Routing Protocol)
VRRP (Virtual Router Redundancy Protocol)
STP (Spanning Tree Protocol)
LLMNR (Link Local Multicast Name Resolution)
NBT-NS (NetBIOS Name Service)
In Progress:
HSRPv1/v2 (Hot Standby Redundancy Protocol)
DHCPv6
THE SCANNER DOES NOT CREATE ANY NOISE ON THE NETWORK.
As input, the scanner takes two arguments:
- network interface (--interface)
- Timeout (the amount of time that a packet will be waiting for, according to the filters inside the scanner) (--timeout) Example:
sudo python3 Above.py --interface eth0 --timeout 60
After the scanner finishes sniffing a certain protocol, it will display some information about the protocol itself, the impact of the attack and which tool for the attack can be used. Over time, based on your issues, this parameter will improve.
sudo pip3 install -r requirements.txt
sudo ip link set ethX promisc on