Skip to content

Latest commit

 

History

History
52 lines (36 loc) · 1.78 KB

README.md

File metadata and controls

52 lines (36 loc) · 1.78 KB

My offensive security code library.

Note: By using these scripts, you accept any liabilities/consequences. I am not liable for your use of these items. You should only be used on your systems or systems with express written consent from the owner.

IP to integer converter

This script uses the Scapy library to capture Multicast DNS packets on port 5353, including the necessary packet fields for recon and spoofing/MITM. The script distinguishes between DNS queries and responses, printing relevant information for each. Saves the output to a file named output.txt.

Output example:

Source IP: 192.168.237.133
Destination IP: 192.168.237.134
Source Port: 5353
Destination Port: 5353
Source MAC: 40:00:xx:xx:xx:xx
Destination MAC: 01:00:xx:xx:xx:xx
RDATA: b'_mediaremotetv._tcp.local.'
RDATA: [b'model=J105aAP']
RDATA: b'_companion-link._tcp.local.'
RDATA: b'_airplay._tcp.local.'
RDATA: b'_raop._tcp.local.'
RDATA: b'_sleep-proxy._udp.local.'

The script iterates over the list of hosts and ports, attempting to grab an SSH banner. If a banner is found, it adds the host, port, and banner to a table printed at the end.

Usage:

python3 get_ssh.py <host1> <host2> ... <hostN>

Output example:

+-----------------+------+--------------------------------+
|       Host      | Port |             Banner             |
+-----------------+------+--------------------------------+
| 192.168.237.133 |  22  | SSH-2.0-OpenSSH_9.7p1 Debian-5 |
| 192.168.237.134 |  22  |      SSH-2.0-OpenSSH_8.0       |
+-----------------+------+--------------------------------+