-
Notifications
You must be signed in to change notification settings - Fork 28
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Protocol detection #20
Comments
Thanks for checking it out! I really appreciate the feedback here too. The examples are limited to my personal knowledge of tools right now but I'd be happy to add in that functionality. Is TLS detection something metasploit can do or do you have a tool you can refer me to? I'd love to write a plugin and add an example for that as early as this weekend if you can recommend a tool. |
Are you familiar with this tool? It looks like it would accomplish what you're suggesting for SSL specifically. Thanks again for your input, I'll add support for this to decker soon. Let me know if you know of other tools you'd recommend. |
nmap (which is already a plugin) could be used to do protocol detection. |
You're absolutely right, thanks for the guidance! |
Just wanted you to know I started working on this, ran into an issue with a library the nmap plugin was using so it's taking a little longer than expected just to avoid making a mess. Thanks again for the feedback/suggestion. You can expect something like this to be available soon:
|
I wasn't sure if I'd have time to finish this this weekend so pushed up a separate plugin specifically for this purpose. It's pretty rough but will be refactored soon and merged with the existing nmap plugin. It also works a bit differently than I mentioned earlier for now and is dangerous, it'll likely panic if you tell it to run on all In the mean time there's an example config file here. It'll look like this (make sure the plugin is
You can run the example with |
Dumb question here : If an host has 2 ssh services running, let's say 22 and 2222. Will the foreach loop process each port ? |
Thats correct, in that case both ports would be processed. nmap.ssh ends up being a list of ports open with that service detected and the for each grabs one at a time from the list and substitutes it into
|
Hey !
|
Hi,
First if all, thanks for the project! I really like the idea.
The README mentions following example:
However, most of the time you will need to detect the protocol and not rely on standard ports.
Is it currently possible to do so? e.g. launch a TLS scan for every port where (START)TLS was detected?
The text was updated successfully, but these errors were encountered: