This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Nettacker"
Ali Razmjoo (talk | contribs) (edit img size) |
Ali Razmjoo (talk | contribs) |
||
Line 28: | Line 28: | ||
==Description== | ==Description== | ||
− | [[File:2018-01-19 0-45-07.gif| | + | [[File:2018-01-19 0-45-07.gif|550px|OWASP Nettacker Demo]] |
Nettacker project was created to automated for information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and information. This software is able to use SYN, ACK, TCP, ICMP and many other protocols to detect and bypass the Firewalls/IDS/IPS and devices. By using a unique solution in Nettacker to find protected services such as SCADA We could make a point to be one of the bests of scanners. | Nettacker project was created to automated for information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and information. This software is able to use SYN, ACK, TCP, ICMP and many other protocols to detect and bypass the Firewalls/IDS/IPS and devices. By using a unique solution in Nettacker to find protected services such as SCADA We could make a point to be one of the bests of scanners. |
Revision as of 20:31, 2 February 2018
- Main
- FAQs
- Requirement / Installation
- Road Map and Getting Involved
- Minimum Viable Product
- Developers
- Project About
OWASP Nettacker ProjectWhat is OWASP Nettacker ?
OWASP Nettacker is an open source software in Python language which lets you automated penetration testing and automated Information Gathering. This software can be run on Windows/Linux/OSX under Python.
DescriptionNettacker project was created to automated for information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and information. This software is able to use SYN, ACK, TCP, ICMP and many other protocols to detect and bypass the Firewalls/IDS/IPS and devices. By using a unique solution in Nettacker to find protected services such as SCADA We could make a point to be one of the bests of scanners.
DISCLAIMERThis tool is related to IT, Hacking, Programming, and Computer|Network|Software Security. The word “Hack”, "Pen testing",“Hacking” that is used on these project pages shall be regarded as “Ethical Hack” or “Ethical Hacking” respectively. This is not a tool that provides any illegal information.We do not promote hacking or software cracking. All the information provided on these pages is for educational purposes only. The authors of this tool are not responsible for any misuse of the information.You shall not misuse the information to gain unauthorized access and/or write malicious programs.This information shall only be used to expand knowledge and not for causing malicious or damaging attacks.You may try all of these techniques on your own computer at your own risk.Performing any hack attempts/tests without written permission from the owner of the computer system is illegal. IN NO EVENT SHALL THE CREATORS, OWNER, OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
FeaturesIoT Scanner LicensingApache License Version 2.0, January 2004The OWASP Nettacker is free to use and is licensed under the Apache 2 License. Click to see the full license
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. |
Project LeadersContributors & Main DevelopersLinksBe an OWASP Nettacker DeveloperRelated links |
Quick Download[Download Page.] News and EventsDocs
Classifications |
Installation You can install OWASP Nettacker by using pip install -r requirements.txt && python setup.py install. In the feature, you will be able to install this tools from PyPi library by pip install OWASP-Nettacker (It's not available yet!). After the installation, you can run the software by using the nettacker command line on Windows, Mac OS X, Linux.
Roadmap
As of October, 2017, the highest priorities for the next one year are:
- Planning for activating features
- Build Nettacker API
- Find developers to get better performance, quality, optimizing and best improvement in minimum possible time
- Get other people to review the OWASP Nettacker Project provide feedback
- Incorporate feedback into changes in the Project and the features
- Keep test, developing and updating with best new methods
- Build and update documents in several languages for developers/users guiding
Subsequent Releases will add
- Internationalization Support
- Additional Unit Tests
- Automated Regression tests
Project Leaders
- Ali Razmjoo
- Mohammad Reza Espargham
Contributors
- Vahid Behzadan
- Mojtaba MasoumPour
- Ehsan Nezami
- camel32bit
Be an OWASP Nettacker developer
Developers can add new features and if you don’t have an idea but like to develop, you can submit the issue, which software needs to be fix/add/done in HERE.
After fix/add or develop something, please send your pull request and remember that your code must be compatible with python2 and python3. If you have any question you can open an issue or just mail us. do not forget to register on our mailing list.