Kali Linux Tutorials - Sandmap - Nmap Automation Tool - Kali Linux Command



What is Sandmap ?

  • Sandmap is a security tool supporting network & system reconnaissance using Nmap (network discovery and security auditing).
  • It is User-friendly-interface and speed up scanning.
  • It is used to allow many advanced scanning techniques.
  • There are some features available, which includes predefined scans, multiple scans and to support Nmap Scripting Engine.
 sandmap

Learn Ethical Hacking - Ethical Hacking tutorial - Sandmap - Ethical Hacking examples - Ethical Hacking programs

Alternatives of Sandmap :

Recon-ng

  • Recon-ng is a full-featured web reconnaissance frame work. It was developed by Tim Tomes.
  • It is written in Python. This tool is focused on web-based open-source reconnaissance. It is modular framework and easy to access by new python developers.
  • It is used for penetration testing and security assessments. It is similar to Metasploit framework.
 recon ng

Learn Ethical Hacking - Ethical Hacking tutorial - Recon-ng - Ethical Hacking examples - Ethical Hacking programs

0TRACE.PY

  • 0TRACE.PY is hop enumeration & security tool , which is developed by Michal zalewaki. It is a python port.
  • It performs reconnaissance and hop enumeration (similar to traceroute).
  • It uses established TCP connection.
  • It is used to gather information about network.
 trace py

Learn Ethical Hacking - Ethical Hacking tutorial - 0TRACE.PY - Ethical Hacking examples - Ethical Hacking programs

Detectem

  • Detectem is a vulnerability detection system, which is used for get software information. It has features of Command line interface and JSON output supported.
  • It is written in python and it is very much helpful in penetration testing.
  • It is used for the purposes: Application testing , Vulnerability scanning.
 detectem

Learn Ethical Hacking - Ethical Hacking tutorial - Detectem - Ethical Hacking examples - Ethical Hacking programs

Gitem

  • Gitem is a reconnaissance tool, which is used to extract information and it is written in python
  • It is developed by Matt Schwager.
  • It is used to find the leaking of sensitive data, security assessment, security monitoring.
 Gitem

Learn Ethical Hacking - Ethical Hacking tutorial - Gitem - Ethical Hacking examples - Ethical Hacking programs

Step by Step Procedure :

Step 1:

 open terminal

Learn Ethical Hacking - Ethical Hacking tutorial - Open Terminal - Ethical Hacking examples - Ethical Hacking programs

Step 2:

  • Type sandmap command to open sandmap tool.
 type sandmap

Learn Ethical Hacking - Ethical Hacking tutorial - Type Sandmap - Ethical Hacking examples - Ethical Hacking programs

  • The sandmap page will be loading.
 loading modules

Learn Ethical Hacking - Ethical Hacking tutorial - Loading Modules - Ethical Hacking examples - Ethical Hacking programs

Step 3:

  • The sandmap interface is displayed which is to automate, speed up scanning & allow to use advanced scanning. Type help command to view the help commands.
 type help

Learn Ethical Hacking - Ethical Hacking tutorial - Type help - Ethical Hacking examples - Ethical Hacking programs

  • Help commands are Displayed. They are mentioned below:
    • help - Show cli help or module help
    • list - Show available modules
    • config - Show global or module configuration
    • set - set global or module variable value
    • use - Use module
    • pushd - Command line commands stack
    • search - Search key in all commands
    • reload - Reload all modules cache or configuration
    • banner - Show banner
 help commands displayed

Learn Ethical Hacking - Ethical Hacking tutorial - Help commands displayed - Ethical Hacking examples - Ethical Hacking programs

Step 4:

  • Type list command to view all modules.
 type list to view modules

Learn Ethical Hacking - Ethical Hacking tutorial - Type list to view modules - Ethical Hacking examples - Ethical Hacking programs

  • Select host_discovery option for discovering host details.
 select host discovery

Learn Ethical Hacking - Ethical Hacking tutorial - Select Host Discovery - Ethical Hacking examples - Ethical Hacking programs

Step 5:

  • Type use host_discovery command for discovering particular host details.
 use host discovery

Learn Ethical Hacking - Ethical Hacking tutorial - Use host discovery - Ethical Hacking examples - Ethical Hacking programs

Step 6:

 set target

Learn Ethical Hacking - Ethical Hacking tutorial - Set target - Ethical Hacking examples - Ethical Hacking programs

  • Type show command for alias, which means attacking commands.
 type show to view attacking commands

Learn Ethical Hacking - Ethical Hacking tutorial - Type show to view attacking commands - Ethical Hacking examples - Ethical Hacking programs

  • The attacking commands are displayed. They are the following terms:
    • list_scan
    • ping_scan
    • no_port_scan
    • tcp_syn_ping
    • udp_ping
    • tcp_ack_ping
    • sctp_init_ping
    • arp_ping
    • icmp_ping-1
    • icmp_ping-2
    • icmp_ping-3
 ping command

Learn Ethical Hacking - Ethical Hacking tutorial - Ping command - Ethical Hacking examples - Ethical Hacking programs

Step 7:

  • Type init 0 command to initiate the list_scan command's ID number.
 list scan

Learn Ethical Hacking - Ethical Hacking tutorial - List scan - Ethical Hacking examples - Ethical Hacking programs

  • The output is displayed and also Nmap command appeared as nmap -sL www.wikitechy.com
 nmap command

Learn Ethical Hacking - Ethical Hacking tutorial - Nmap command - Ethical Hacking examples - Ethical Hacking programs

Step 8:

  • Type init 8 command for arp_ping ( Address resolution protocol ping which is used to discover link layer address ) and the result is displayed.
 ping command

Learn Ethical Hacking - Ethical Hacking tutorial - Ping command - Ethical Hacking examples - Ethical Hacking programs

Step 9:

  • Type init 8 command ( ihttp-config-backup ) which is to get some cookies values.
 http config backup

Learn Ethical Hacking - Ethical Hacking tutorial - Http config backup - Ethical Hacking examples - Ethical Hacking programs

  • The output of http-config-backup command is displayed. This site address doesn’t show any cookies values, which means the site is protected.
 http config backup command

Learn Ethical Hacking - Ethical Hacking tutorial - Http config backup command - Ethical Hacking examples - Ethical Hacking programs

Step 10:

  • Type init 20 command ( http-frontpage-login ) which is to get login details and the output are displayed.
 http front page login

Learn Ethical Hacking - Ethical Hacking tutorial - Http front page login - Ethical Hacking examples - Ethical Hacking programs

Step 11:

  • Type init 47 command ( http-vhosts ) which is to view verbose status code and the outputs are displayed.
 http yhosts

Learn Ethical Hacking - Ethical Hacking tutorial - Http yhosts - Ethical Hacking examples - Ethical Hacking programs

Step 12:



Related Searches to Sandmap - Nmap Automation Tool