Are you happy with your logging solution? Would you help us out by taking a 30-second survey? Click here

port-scan-automation

Automate NMAP Scans and Generate Custom Nessus Policies Automatically

Subscribe to updates I use port-scan-automation


Statistics on port-scan-automation

Number of watchers on Github 76
Number of open issues 2
Main language Shell
Open pull requests 2+
Closed pull requests 0+
Last commit over 6 years ago
Repo Created over 6 years ago
Repo Last Updated over 1 year ago
Size 152 KB
Organization / Authornccgroup
Contributors1
Page Updated
Do you use port-scan-automation? Leave a review!
View open issues (2)
View port-scan-automation activity
View on github
Fresh, new opensource launches 🚀🚀🚀
Trendy new open source projects in your inbox! View examples

Subscribe to our mailing list

Evaluating port-scan-automation for your project? Score Explanation
Commits Score (?)
Issues & PR Score (?)

LazyMap - Auto NMAP Scanning Script

Automate NMAP scans and custom Nessus polices.

Released as open source by NCC Group Plc - http://www.nccgroup.com/

Developed by Daniel Compton, daniel dot compton at nccgroup dot com

https://github.com/nccgroup/port-scan-automation

Released under AGPL see LICENSE for more information

Installing

git clone https://github.com/nccgroup/port-scan-automation.git

How To Use

./lazymap.sh

Features

  • Discovers live devices
  • Auto launches port scans on only the discoverd live devices
  • Can run mulitple instances on multiple adaptors at once
  • Creates client Ref directory for each scan
  • Outputs all unique open ports in a Nessus ready format. Much faster to scan in Nessus.
  • Runs as default a T4 speed scan. If you find this too slow, you can press CTRL C in the scan window and it will cleanup and relaunch that one scan with T5 speed option.
  • Logs all start/stop times, live hosts, hosts down, unique ports.
  • Auto creates a custom Nessus policy with only the discovered ports, must faster to scan. *

    • Read the script header carefully, in order for the auto Nessus policy creater you must first save a default template to the same directory as the script. The script will detect the default template and create you a unique Nessus policy after each scan for just the unique ports. Then simply import the policy into Nessus and scan just the live devices that the script found. This will save a massive amount of time scanning, plus will give you more accurate findings.
    • By Default it will scan a full TCP, Quick UDP, Common ports and a Safe Script scan. You can turn these on and off in the header.

Requirements

  • NMAP http://www.nmap.org

Tested on Backtrack 5 and Kali.

Screen Shot

Screenshot

Screenshot

Screenshot

Change Log

Version 1.8 - Official release.

port-scan-automation open pull requests (View All Pulls)
  • Update lazymap.sh
  • Update README.md
port-scan-automation list of languages used
Other projects in Shell