Kali Linux Tutorials - Sandmap - Nmap Automation Tool - Kali Linux Command
What is Sandmap ?
- Sandmap is a security tool supporting network & system reconnaissance using Nmap (network discovery and security auditing).
- It is User-friendly-interface and speed up scanning.
- It is used to allow many advanced scanning techniques.
- There are some features available, which includes predefined scans, multiple scans and to support Nmap Scripting Engine.
![sandmap](https://cdn.wikitechy.com/tutorials/ethical-hacking/sandmap.png)
Learn Ethical Hacking - Ethical Hacking tutorial - Sandmap - Ethical Hacking examples - Ethical Hacking programs
Alternatives of Sandmap :
Recon-ng
- Recon-ng is a full-featured web reconnaissance frame work. It was developed by Tim Tomes.
- It is written in Python. This tool is focused on web-based open-source reconnaissance. It is modular framework and easy to access by new python developers.
- It is used for penetration testing and security assessments. It is similar to Metasploit framework.
![recon ng](https://cdn.wikitechy.com/tutorials/ethical-hacking/recon-ng.png)
Learn Ethical Hacking - Ethical Hacking tutorial - Recon-ng - Ethical Hacking examples - Ethical Hacking programs
0TRACE.PY
- 0TRACE.PY is hop enumeration & security tool , which is developed by Michal zalewaki. It is a python port.
- It performs reconnaissance and hop enumeration (similar to traceroute).
- It uses established TCP connection.
- It is used to gather information about network.
![trace py](https://cdn.wikitechy.com/tutorials/ethical-hacking/trace-py.png)
Learn Ethical Hacking - Ethical Hacking tutorial - 0TRACE.PY - Ethical Hacking examples - Ethical Hacking programs
Detectem
- Detectem is a vulnerability detection system, which is used for get software information. It has features of Command line interface and JSON output supported.
- It is written in python and it is very much helpful in penetration testing.
- It is used for the purposes: Application testing , Vulnerability scanning.
![detectem](https://cdn.wikitechy.com/tutorials/ethical-hacking/detectem.png)
Learn Ethical Hacking - Ethical Hacking tutorial - Detectem - Ethical Hacking examples - Ethical Hacking programs
Gitem
- Gitem is a reconnaissance tool, which is used to extract information and it is written in python
- It is developed by Matt Schwager.
- It is used to find the leaking of sensitive data, security assessment, security monitoring.
![Gitem](https://cdn.wikitechy.com/tutorials/ethical-hacking/gitem.png)
Learn Ethical Hacking - Ethical Hacking tutorial - Gitem - Ethical Hacking examples - Ethical Hacking programs
Step by Step Procedure :
Step 1:
- Open Terminal in Kali Linux
![open terminal](https://cdn.wikitechy.com/tutorials/ethical-hacking/open-terminal.png)
Learn Ethical Hacking - Ethical Hacking tutorial - Open Terminal - Ethical Hacking examples - Ethical Hacking programs
Step 2:
- Type sandmap command to open sandmap tool.
![type sandmap](https://cdn.wikitechy.com/tutorials/ethical-hacking/type-sandmap.png)
Learn Ethical Hacking - Ethical Hacking tutorial - Type Sandmap - Ethical Hacking examples - Ethical Hacking programs
- The sandmap page will be loading.
![loading modules](https://cdn.wikitechy.com/tutorials/ethical-hacking/loading-modules.png)
Learn Ethical Hacking - Ethical Hacking tutorial - Loading Modules - Ethical Hacking examples - Ethical Hacking programs
Read Also
Step 3:
- The sandmap interface is displayed which is to automate, speed up scanning & allow to use advanced scanning. Type help command to view the help commands.
![type help](https://cdn.wikitechy.com/tutorials/ethical-hacking/type-help.png)
Learn Ethical Hacking - Ethical Hacking tutorial - Type help - Ethical Hacking examples - Ethical Hacking programs
- Help commands are Displayed. They are mentioned below:
- help - Show cli
help
or modulehelp
- list - Show available modules
- config - Show global or module configuration
- set -
set
global or module variable value - use - Use module
- pushd - Command line commands stack
- search - Search key in all commands
- reload - Reload all modules cache or configuration
- banner - Show banner
- help - Show cli
![help commands displayed](https://cdn.wikitechy.com/tutorials/ethical-hacking/help-commands-displayed.png)
Learn Ethical Hacking - Ethical Hacking tutorial - Help commands displayed - Ethical Hacking examples - Ethical Hacking programs
Step 4:
- Type list command to view all modules.
![type list to view modules](https://cdn.wikitechy.com/tutorials/ethical-hacking/type-list-to-view-modules.png)
Learn Ethical Hacking - Ethical Hacking tutorial - Type list to view modules - Ethical Hacking examples - Ethical Hacking programs
- Select
host_discovery
option for discovering host details.
![select host discovery](https://cdn.wikitechy.com/tutorials/ethical-hacking/select-host-discovery.png)
Learn Ethical Hacking - Ethical Hacking tutorial - Select Host Discovery - Ethical Hacking examples - Ethical Hacking programs
Step 5:
- Type use host_discovery command for discovering particular host details.
![use host discovery](https://cdn.wikitechy.com/tutorials/ethical-hacking/use-host-discovery.png)
Learn Ethical Hacking - Ethical Hacking tutorial - Use host discovery - Ethical Hacking examples - Ethical Hacking programs
Step 6:
- Type set dest www.wikitechy.com command for setting destination (for your target)
![set target](https://cdn.wikitechy.com/tutorials/ethical-hacking/set-target.png)
Learn Ethical Hacking - Ethical Hacking tutorial - Set target - Ethical Hacking examples - Ethical Hacking programs
- Type show command for alias, which means attacking commands.
![type show to view attacking commands](https://cdn.wikitechy.com/tutorials/ethical-hacking/type-show-to-view-attacking-commands.png)
Learn Ethical Hacking - Ethical Hacking tutorial - Type show to view attacking commands - Ethical Hacking examples - Ethical Hacking programs
- The attacking commands are displayed. They are the following terms:
- list_scan
- ping_scan
- no_port_scan
- tcp_syn_ping
- udp_ping
- tcp_ack_ping
- sctp_init_ping
- arp_ping
- icmp_ping-1
- icmp_ping-2
- icmp_ping-3
![ping command](https://cdn.wikitechy.com/tutorials/ethical-hacking/ping-command.png)
Learn Ethical Hacking - Ethical Hacking tutorial - Ping command - Ethical Hacking examples - Ethical Hacking programs
Step 7:
- Type init 0 command to initiate the list_scan command's ID number.
![list scan](https://cdn.wikitechy.com/tutorials/ethical-hacking/list-scan.png)
Learn Ethical Hacking - Ethical Hacking tutorial - List scan - Ethical Hacking examples - Ethical Hacking programs
- The output is displayed and also Nmap command appeared as nmap -sL www.wikitechy.com
![nmap command](https://cdn.wikitechy.com/tutorials/ethical-hacking/nmap-command.png)
Learn Ethical Hacking - Ethical Hacking tutorial - Nmap command - Ethical Hacking examples - Ethical Hacking programs
Step 8:
- Type init 8 command for arp_ping ( Address resolution protocol ping which is used to discover link layer address ) and the result is displayed.
![ping command](https://cdn.wikitechy.com/tutorials/ethical-hacking/ping-command.png)
Learn Ethical Hacking - Ethical Hacking tutorial - Ping command - Ethical Hacking examples - Ethical Hacking programs
Step 9:
- Type init 8 command ( ihttp-config-backup ) which is to get some cookies values.
![http config backup](https://cdn.wikitechy.com/tutorials/ethical-hacking/http-config-backup.png)
Learn Ethical Hacking - Ethical Hacking tutorial - Http config backup - Ethical Hacking examples - Ethical Hacking programs
- The output of http-config-backup command is displayed. This site address doesn’t show any cookies values, which means the site is protected.
![http config backup command](https://cdn.wikitechy.com/tutorials/ethical-hacking/http-config-backup-command.png)
Learn Ethical Hacking - Ethical Hacking tutorial - Http config backup command - Ethical Hacking examples - Ethical Hacking programs
Read Also
Step 10:
- Type init 20 command ( http-frontpage-login ) which is to get login details and the output are displayed.
![http front page login](https://cdn.wikitechy.com/tutorials/ethical-hacking/http-front-page-login.png)
Learn Ethical Hacking - Ethical Hacking tutorial - Http front page login - Ethical Hacking examples - Ethical Hacking programs
Step 11:
- Type init 47 command ( http-vhosts ) which is to view verbose status code and the outputs are displayed.
![http yhosts](https://cdn.wikitechy.com/tutorials/ethical-hacking/http-yhosts.png)
Learn Ethical Hacking - Ethical Hacking tutorial - Http yhosts - Ethical Hacking examples - Ethical Hacking programs
Step 12:
- If you want to learn about Ethical Hacking Course & Kali Linux Tutorial , you can refer the following links Ethical Hacking Training in Chennai , Ethical Hacking tutorial , Hacking Course , Ethical Hacking Course in Chennai