Wrapper for my usual enumeration scans for CTFs, Hackthebox, OSCP
Within a screen
session:
./ctfscan.py --target IP_OR_HOSTNAME
- Runs
nmap
scan against target in a newscreen
window - Parses
nmap
output for open ports running HTTP services - Runs
gobuster
in a separatescreen
window for each open HTTP service
bash
screen
nmap
gobuster
- Run more commands based on more services parsed from
nmap
output - Some sort of "fast" mode which will assume an open port is running the service it is traditionally known for (whereas currently the
nmap
output parsing is more conservative, waiting for confirmation)