Skip to content

ifly53e/NmapBomb

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 

Repository files navigation

NmapBomb

Combinatorial Test Configurations for Nmap to maximize the chances of discovering hosts and ports in a subnet. Why? Because I could be as noisy as I needed to be and I wanted to minimize my chances of missing a host or port.

Install and Usage

  • Copy files to the same directory

Defaults are:

  • -t T3,

  • --top-ports 1000,

  • -PO1,2,4,16,17,132,

  • -f TARGET_PORT_$(date +'%FT%H%M%S%3N').xml

  • Usage for defaults: nmapbomb -i 192.168.48.0/24

  • Usage to change defaults: nmapbomb -i 192.168.48.0/24 -f myfilename.xml -o 1,2,4 -t T4 -p 100

What does the NmapBomb do?

Nmapbomb is a bash script that:

  • Runs all three way combinations of all ping scans for Host Discovery
  • Runs all three way combinations of all port scanning techniques on discovered hosts except -sI (Zombie) and -b (FPT bounce scan).
  • Runs three way combinations of TCP flags for custom port scanning techniques.
  • Saves all scans as xml in a unique folder.
  • Opens the folder of scan files with Zenmap for analysis.

How was the NmapBomb created?

Nmap configurations were generated using a software testing technique called Combinatorial Testing (CT). CT is used to discover software bugs by generating all combinations of input parameters to produce configurations that will crash the program. Instead of trying to crash Nmap, I am trying to produce unique and untested Nmap configurations to discover new hosts, ports, and services. CT is similar to pairwise testing but instead of changing two input parameters at time, three input parameters are changed. This allows more testing tuples to be included in every Nmap configuration, thus reducing the total number of Nmap runs.

How many different scans are included in the NmapBomb?

24 host discovery scans and 88 port scans for a total of 112.

How fast does the NmapBomb take to complete all of the scans?

All of the timing options for Nmap are available but T3 takes more than a day due to lengthy UDP scans.

Where can I download it, test it, and provide constructive feedback?

https://github.com/ifly53e/NmapBomb

About

Combinatorial Test Configurations for Nmap

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages