-
-
Notifications
You must be signed in to change notification settings - Fork 787
Modules
OWASP Nettacker Modules can be of type Scan (scan for something), Vuln (check for some vulnerability) and Brute (Brute force)
- 'admin_scan' - Scan the target for various Admin folders such as /admin /phpmyadmin /cmsadmin /wp-admin etc
- 'citrix_lastpatcheddate_scan' Scan the target and try to detect Citrix Netscaler Gateway and it's last patched date
- 'cms_detection_scan' - Scan the target and try to detect the CMS (Wordpress, Drupal or Joomla) using response fingerprinting
- 'confluence_version_scan' - Scan the target and identify the Confluence version
- 'dir_scan' - Scan the target for well-known directories
- 'drupal_modules_scan' - Scan the target for popular Drupal modules
- 'drupal_theme_scan' - Scan the target for popular Drupal themes
- 'drupal_version_scan' - Scan the target and identify the Drupal version
- 'icmp_scan' - Ping the target and log the response time if it responds.
- 'http_redirect_scan' - Scan the target and test if it returns an HTTP redirect 3xx response code and print the destination
- 'http_status_scan' - Scan the target and return the HTTP status code
- 'joomla_template_scan' - Scan the target for Joomla templates (identify Joomla sites)
- 'joomla_user_enum_scan' - Scan the target and enumerate Joomla users
- 'joomla_version_scan' - Scan the target and identify the Joomla version
- 'moveit_version_scan' - Scan the target and identify the Progress MOVEit version
- 'pma_scan' - Scan the target for PHP MyAdmin presence
- 'port_scan' - Scan the target for open ports identifying the popular services using signatures (.e.g SSH on port 2222)
- 'sender_policy_scan' - Scan the target domains/subdomains for SPF policy settings
- 'shodan_scan' - Scan the target domains/subdomains/IP in Shodan. Put your Shodan API key i "shodan_api_key" method arg, "shodan_query_override" to run any Shodan query overriding the Nettacker target
- 'subdomain_scan' - Scan the target for subdomains (target must be a domain e.g. owasp.org)
- 'viewdns_reverse_ip_lookup_scan' - Identify which sites/domains are hosted on the target host using ViewDNS.info
- 'wappalyzer_scan' - Scan the target and try to identify the technologies and libraries used using Wappalyzer
- 'wordpress_version_scan' - Scan the target and identify the WordPress version
- 'wp_plugin_scan' - Scan the target for popular WordPress Plugins
- 'wp_theme_scan' - Scan the target for popular WordPress themes
- 'wp_timthumbs_scan' - Scan the target for WordPress TimThumb.php script in various possible locations
- 'wp_user_enum_scan' - Scan the target WordPress site and Enumerate Users
If you want to scan all ports please define -g 1-65535 range. Otherwise Nettacker will scan for these 1000 most popular ports:
[1, 3, 4, 6, 7, 9, 13, 17, 19, 20, 21, 22, 23, 24, 25, 26, 30, 32, 33, 37, 42,
43, 49, 53, 67, 68, 69, 70, 79, 80, 81, 82, 83, 84, 85, 88, 89, 90, 99, 100, 106, 109, 110,
111, 113, 119, 125, 135, 139, 143, 144, 146, 161, 162, 163, 179, 199, 211, 212, 222,
254, 255, 256, 259, 264, 280, 301, 306, 311, 340, 366, 389, 406, 407, 416, 417,
425, 427, 443, 444, 445, 458, 464, 465, 481, 497, 500, 512, 513, 514, 515, 524,
541, 543, 544, 545, 548, 554, 555, 563, 587, 593, 616, 617, 625, 631, 636, 646,
648, 666, 667, 668, 683, 687, 691, 700, 705, 711, 714, 720, 722, 726, 749, 765,
777, 783, 787, 800, 801, 808, 843, 873, 880, 888, 898, 900, 901, 902, 903, 911,
912, 981, 987, 990, 992, 993, 995, 999, 1000, 1001, 1002, 1007, 1009, 1010,
1011, 1021, 1022, 1023, 1024, 1025, 1026, 1027, 1028, 1029, 1030, 1031, 1032,
1033, 1034, 1035, 1036, 1037, 1038, 1039, 1040, 1041, 1042, 1043, 1044, 1045,
1046, 1047, 1048, 1049, 1050, 1051, 1052, 1053, 1054, 1055, 1056, 1057, 1058,
1059, 1060, 1061, 1062, 1063, 1064, 1065, 1066, 1067, 1068, 1069, 1070, 1071,
1072, 1073, 1074, 1075, 1076, 1077, 1078, 1079, 1080, 1081, 1082, 1083, 1084,
1085, 1086, 1087, 1088, 1089, 1090, 1091, 1092, 1093, 1094, 1095, 1096, 1097,
1098, 1099, 1100, 1102, 1104, 1105, 1106, 1107, 1108, 1110, 1111, 1112, 1113,
1114, 1117, 1119, 1121, 1122, 1123, 1124, 1126, 1130, 1131, 1132, 1137, 1138,
1141, 1145, 1147, 1148, 1149, 1151, 1152, 1154, 1163, 1164, 1165, 1166, 1169,
1174, 1175, 1183, 1185, 1186, 1187, 1192, 1198, 1199, 1201, 1213, 1216, 1217,
1218, 1233, 1234, 1236, 1244, 1247, 1248, 1259, 1271, 1272, 1277, 1287, 1296,
1300, 1301, 1309, 1310, 1311, 1322, 1328, 1334, 1352, 1417, 1433, 1434, 1443,
1455, 1461, 1494, 1500, 1501, 1503, 1521, 1524, 1533, 1556, 1580, 1583, 1594,
1600, 1641, 1658, 1666, 1687, 1688, 1700, 1717, 1718, 1719, 1720, 1721, 1723,
1755, 1761, 1782, 1783, 1801, 1805, 1812, 1839, 1840, 1862, 1863, 1864, 1875,
1900, 1914, 1935, 1947, 1971, 1972, 1974, 1984, 1998, 1999, 2000, 2001, 2002,
2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2013, 2020, 2021, 2022, 2030,
2033, 2034, 2035, 2038, 2040, 2041, 2042, 2043, 2045, 2046, 2047, 2048, 2049,
2065, 2068, 2099, 2100, 2103, 2105, 2106, 2107, 2111, 2119, 2121, 2126, 2135,
2144, 2160, 2161, 2170, 2179, 2190, 2191, 2196, 2200, 2222, 2251, 2260, 2288,
2301, 2323, 2366, 2381, 2382, 2383, 2393, 2394, 2399, 2401, 2492, 2500, 2522,
2525, 2557, 2601, 2602, 2604, 2605, 2607, 2608, 2638, 2701, 2702, 2710, 2717,
2718, 2725, 2800, 2809, 2811, 2869, 2875, 2909, 2910, 2920, 2967, 2968, 2998,
3000, 3001, 3003, 3005, 3006, 3007, 3011, 3013, 3017, 3030, 3031, 3052, 3071,
3077, 3128, 3168, 3211, 3221, 3260, 3261, 3268, 3269, 3283, 3300, 3301, 3306,
3322, 3323, 3324, 3325, 3333, 3351, 3367, 3369, 3370, 3371, 3372, 3389, 3390,
3404, 3476, 3493, 3517, 3527, 3546, 3551, 3580, 3659, 3689, 3690, 3703, 3737,
3766, 3784, 3800, 3801, 3809, 3814, 3826, 3827, 3828, 3851, 3869, 3871, 3878,
3880, 3889, 3905, 3914, 3918, 3920, 3945, 3971, 3986, 3995, 3998, 4000, 4001,
4002, 4003, 4004, 4005, 4006, 4045, 4111, 4125, 4126, 4129, 4224, 4242, 4279,
4321, 4343, 4443, 4444, 4445, 4446, 4449, 4550, 4567, 4662, 4848, 4899, 4900,
4998, 5000, 5001, 5002, 5003, 5004, 5009, 5030, 5033, 5050, 5051, 5054, 5060,
5061, 5080, 5087, 5100, 5101, 5102, 5120, 5190, 5200, 5214, 5221, 5222, 5225,
5226, 5269, 5280, 5298, 5357, 5405, 5414, 5431, 5432, 5440, 5500, 5510, 5544,
5550, 5555, 5560, 5566, 5631, 5633, 5666, 5678, 5679, 5718, 5730, 5800, 5801,
5802, 5810, 5811, 5815, 5822, 5825, 5850, 5859, 5862, 5877, 5900, 5901, 5902,
5903, 5904, 5906, 5907, 5910, 5911, 5915, 5922, 5925, 5950, 5952, 5959, 5960,
5961, 5962, 5963, 5987, 5988, 5989, 5998, 5999, 6000, 6001, 6002, 6003, 6004,
6005, 6006, 6007, 6009, 6025, 6059, 6100, 6101, 6106, 6112, 6123, 6129, 6156,
6346, 6389, 6502, 6510, 6543, 6547, 6565, 6566, 6567, 6580, 6646, 6666, 6667,
6668, 6669, 6689, 6692, 6699, 6779, 6788, 6789, 6792, 6839, 6881, 6901, 6969,
7000, 7001, 7002, 7004, 7007, 7019, 7025, 7070, 7100, 7103, 7106, 7200, 7201,
7402, 7435, 7443, 7496, 7512, 7625, 7627, 7676, 7741, 7777, 7778, 7800, 7911,
7920, 7921, 7937, 7938, 7999, 8000, 8001, 8002, 8007, 8008, 8009, 8010, 8011,
8021, 8022, 8031, 8042, 8045, 8080, 8081, 8082, 8083, 8084, 8085, 8086, 8087,
8088, 8089, 8090, 8093, 8099, 8100, 8180, 8181, 8192, 8193, 8194, 8200, 8222,
8254, 8290, 8291, 8292, 8300, 8333, 8383, 8400, 8402, 8443, 8500, 8600, 8649,
8651, 8652, 8654, 8701, 8800, 8873, 8888, 8899, 8994, 9000, 9001, 9002, 9003,
9009, 9010, 9011, 9040, 9050, 9071, 9080, 9081, 9090, 9091, 9099, 9100, 9101,
9102, 9103, 9110, 9111, 9200, 9207, 9220, 9290, 9415, 9418, 9485, 9500, 9502,
9503, 9535, 9575, 9593, 9594, 9595, 9618, 9666, 9876, 9877, 9878, 9898, 9900,
9917, 9929, 9943, 9944, 9968, 9998, 9999, 10000, 10001, 10002, 10003, 10004,
10009, 10010, 10012, 10024, 10025, 10082, 10180, 10215, 10243, 10566, 10616,
10617, 10621, 10626, 10628, 10629, 10778, 11110, 11111, 11967, 12000, 12174,
12265, 12345, 13456, 13722, 13782, 13783, 14000, 14238, 14441, 14442, 15000,
15002, 15003, 15004, 15660, 15742, 16000, 16001, 16012, 16016, 16018, 16080,
16113, 16992, 16993, 17877, 17988, 18040, 18101, 18988, 19101, 19283, 19315,
19350, 19780, 19801, 19842, 20000, 20005, 20031, 20221, 20222, 20828, 21571,
22939, 23502, 24444, 24800, 25734, 25735, 26214, 27000, 27352, 27353, 27355,
27356, 27715, 28201, 30000, 30718, 30951, 31038, 31337, 32768, 32769, 32770,
32771, 32772, 32773, 32774, 32775, 32776, 32777, 32778, 32779, 32780, 32781,
32782, 32783, 32784, 32785, 33354, 33899, 34571, 34572, 34573, 35500, 38292,
40193, 40911, 41511, 42510, 44176, 44442, 44443, 44501, 45100, 48080, 49152,
49153, 49154, 49155, 49156, 49157, 49158, 49159, 49160, 49161, 49163, 49165,
49167, 49175, 49176, 49400, 49999, 50000, 50001, 50002, 50003, 50006, 50300,
50389, 50500, 50636, 50800, 51103, 51493, 52673, 52822, 52848, 52869, 54045,
54328, 55055, 55056, 55555, 55600, 56737, 56738, 57294, 57797, 58080, 60020,
60443, 61532, 61900, 62078, 63331, 64623, 64680, 65000, 65129, 65389]
- 'apache_struts_vuln' - check Apache Struts for CVE-2017-5638
- 'Bftpd_double_free_vuln' - check bftpd for CVE-2007-2010
- 'Bftpd_memory_leak_vuln' - check bftpd for CVE-2017-16892
- 'Bftpd_parsecmd_overflow_vuln'- check bftpd for CVE-2007-2051
- 'Bftpd_remote_dos_vuln' - check bftpd for CVE-2009-4593
- 'CCS_injection_vuln' - check SSL for Change Cipher Spec (CCS Injection) CVE-2014-0224
- 'citrix_cve_2019_19781_vuln' - check the target for Citrix CVE-2019-19781 vulnerability
- 'citrix_cve_2023_24488_vuln' - check the target for Citrix CVE-2023-24488 XSS vulnerability
- 'clickjacking_vuln' - check the web server for missing 'X-Frame-Options' header (clickjacking protection)
- 'content_security_policy_vuln' - check the web server for missing 'Content-Security-Policy' header
- 'content_type_options_vuln' - check the web server for missing 'X-Content-Type-Options'=nosniff header
- 'f5_cve_2020_5902_vuln' - check the target for F5 RCE CVE-2020-5902 vulnerability
- 'heartbleed_vuln' - check SSL for Heartbleed vulnerability (CVE-2014-0160)
- 'msexchange_cve_2021_26855' - check the target for MS Exchange SSRF CVE-2021-26855 (proxylogon/hafnium)
- 'http_cors_vuln' - check the web server for overly-permissive CORS (header 'Access-Control-Allow-Origin'=*)
- 'options_method_enabled_vuln' - check if OPTIONS method is enabled on the web server
- 'ProFTPd_bypass_sqli_protection_vuln' - check ProFTPd for CVE-2009-0543
- 'ProFTPd_cpu_consumption_vuln' - check ProFTPd for CVE-2008-7265
- 'ProFTPd_directory_traversal_vuln' - check ProFTPd for CVE-2010-3867
- 'ProFTPd_exec_arbitary_vuln' - check ProFTPd for CVE-2011-4130
- 'ProFTPd_heap_overflow_vuln' - check ProFTPd for CVE-2010-4652
- 'ProFTPd_integer_overflow_vuln' - check ProFTPd for CVE-2011-1137
- 'ProFTPd_memory_leak_vuln' - check ProFTPd for CVE-2001-0136
- 'ProFTPd_restriction_bypass_vuln' - check ProFTPd for CVE-2009-3639
- 'self_signed_certificate_vuln' - check for self-signed SSL certificate
- 'server_version_vuln' - check if the web server is leaking server banner in 'Server' response header
- 'ssl_certificate_expired_vuln' - check if SSL certificate has expired
- 'weak_signature_algorithm_vuln'- check if SSL certificate is signed using SHA-1
- 'wordpress_dos_cve_2018_6389_vuln' - check if Wordpress is vulnerable to CVE-2018-6389 Denial Of Service (DOS)
- 'wp_xmlrpc_bruteforce_vuln' - check if Wordpress is vulnerable to credential Brute Force via XMLRPC wp.getUsersBlogs
- 'wp_xmlrpc_pingback_vuln' - check if Wordpress is vulnerable to XMLRPC pingback
- 'x_powered_by_vuln' - check if the web server is leaking server configuration in 'X-Powered-By' response header
- 'xdebug_rce_vuln' - checks if web server is running XDebug version 2.5.5 vulnerable to RCE
- 'XSS_protection_vuln' - check if header 'X-XSS-Protection' header is set to '1; mode=block'
- 'vbulletin_cve_2019_16759_vuln' - check the target for vBulletin RCE CVE-2019-16759 vulnerability
If no extra users/passwords parameters are specified the following default usernames will be used on brute force checks: ["admin", "root", "test", "ftp", "anonymous", "user", "support", "1"] with the following passwords: ["admin", "root", "test", "ftp", "anonymous", "user", "1", "12345",123456", "124567", "12345678", "123456789", "1234567890", "admin1", "password!@#", "support", "1qaz2wsx", "qweasd", "qwerty", "!QAZ2wsx","password1", "1qazxcvbnm", "zxcvbnm", "iloveyou", "password", "p@ssw0rd","admin123", ""]
- 'ftp_brute' - try to brute force FTP users.
- 'http_basic_auth_brute' - try to brute for HTTP Basic Auth users.
- 'http_form_brute' - try to brute force using HTTP form - assuming that the form has 'username' and 'password' fields
- 'http_ntlm_brute' - try to brute force using HTTP NTLM
- 'smtp_brute' - - try to brute force SMTP (ports ["25", "465", "587"])
- 'ssh_brute' - try to brute force SSH (port 22)
- 'telnet_brute' - try to brute force via telnet (port23) (expects "login" and "Password" prompt)
- 'wp_xmlrpc_brute' - try to brute force Wordpress users using XMLRPC and wp.getUsersBlogs method