justatechnology / Phase_Blaster

Takes ip CID blocks, host names, and or IP's from a file and performs large scale host discovery and follows through with available hosts aggressive scans while avoiding any IP's clients deem out of scope via an exclude file. Then produces xml output for Metasploit DB integration. Results are placed in a managed hierachel directory tree. Phase_blaster also allows individual ip entries at any point and adds them into the directory structure and produces new msf ready xml.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

##Phase_Blaster ####Managed reconnaissance scanning for professional pentesters

About

Phase_Blaster takes ip CIDR blocks, Host Names, and or IP's from a file or directly from CLI and performs large scale host discovery and follows through with available hosts aggressive scans or user defined options while avoiding any IP's clients deem out of scope via an exclude file. Phase_Blaster then produces xml output for Metasploit DB integration. All results are placed in a file named results. The user can pass their own nmap commands to meet special needs and a bing api key is used to search all of the ips in our target file to enumerate virtual host FDQN's. If any host shows a web service, VNC, or RDP service available the host is documented and a screenshot of the service is taken.

The nessus file from using option --nessus can be used for Nessus host importing. Phase_Blaster can also convert class B ip CID's to an array of class C's for scanning. More indepth pentesting options are available with options --parse to review the scanned results in a friends IP/Open Ports manner. In addition --nbt runs a nbtscan against any CIDR block host ranges in the ips file.

Phase_Blaster directory structure looks like.

application_dir/

application_dir/nmap

application_dir/nmap/all_hosts/

application_dir/nmap/all_hosts/msf/

USEAGE: Create 2 files in the same directory you have Phase_blaster residing in, one named "ips" the other "exclude". Place all of your ip ranges separated via line breaks into the ips file. Any ip's you need excluded from the scans in the exclude file in the same manner.

call phase_blaster as follows

./Phase_Blaster -f

Phase_blaster also allows individual ip entries at any point and adds them into the directory structure and produces a new msf ready xml file.

if you need to run just one new entry do so as

./Phase_Blaster 0.0.0.0/24

or

./Phase_Blaster 0.0.0.0

Alternative modes -d will perform just a host discovery. Very useful for importing results into Nessus scans. User may go back at any time and perform a -ff which will perform a nmap aggressive scan against the discovered hosts file. My favourite option is the -df which perform a discovery and then follow up with an nmap aggressive scan while delivery a progress output.

About Converting a class B range CID and converts it into class C and dumps the output into the folder ips for Phase_Blaster. This allows nmap to scan a broke down block of class B it could not previously handle in a systematic manner.

call phase_blaster as follows

./Phase_Blaster -bc 127.0.

Output The results would look like

127.0.0.0

127.0.0.1

127.0.0.2.....

127.0.1.0

127.0.1.1

127.0.1.2.....

until

127.0.255.255

For middle recon work use Phase_blaster --parse and Phase_Blaster -nbt. Phase_Blaster --parse will give you a breakout of hosts with open ports only and a brief list of just the open ports. Phase_Blaster -nbt will do a quick nbtscan of the discovered hosts and provide a host name breakdown for all NetBios host names, ip, and MAC addressed of all the system in the ips folders range.

I suggest the command

./Phase_Blaster -bc 10.10. && ./Phase_blaster -df && ./Phase_Blaster --parse

Happy Hacking!

About

Takes ip CID blocks, host names, and or IP's from a file and performs large scale host discovery and follows through with available hosts aggressive scans while avoiding any IP's clients deem out of scope via an exclude file. Then produces xml output for Metasploit DB integration. Results are placed in a managed hierachel directory tree. Phase_blaster also allows individual ip entries at any point and adds them into the directory structure and produces new msf ready xml.


Languages

Language:Shell 100.0%