Skip to content

Commit 11cf630

Browse files
authored
Update Readme.md
Signed-off-by: halil ibrahim deniz <[email protected]>
1 parent 15a0939 commit 11cf630

File tree

1 file changed

+2
-135
lines changed

1 file changed

+2
-135
lines changed

Readme.md

Lines changed: 2 additions & 135 deletions
Original file line numberDiff line numberDiff line change
@@ -81,142 +81,9 @@ options:
8181
- `-c`, `--ping-check`: Perform a ping check before scanning.
8282
- `--use-shodan`: Enable Shodan integration.
8383

84-
## Example Usage
84+
## Usage Examples
8585

86-
### Basic Port Scan
87-
Scan a single IP address on default ports:
88-
```bash
89-
python networksherlock.py 192.168.1.1
90-
```
91-
92-
### Custom Port Range
93-
Scan an IP address with a custom range of ports:
94-
```bash
95-
python networksherlock.py 192.168.1.1 -p 1-1024
96-
```
97-
98-
### Multiple IPs and Port Specification
99-
Scan multiple IP addresses on specific ports:
100-
```bash
101-
python networksherlock.py 192.168.1.1,192.168.1.2 -p 22,80,443
102-
```
103-
104-
### CIDR Block Scan
105-
Scan an entire subnet using CIDR notation:
106-
```bash
107-
python networksherlock.py 192.168.1.0/24 -p 80
108-
```
109-
110-
### Using Multi-Threading
111-
Perform a scan using multiple threads for faster execution:
112-
```bash
113-
python networksherlock.py 192.168.1.1-192.168.1.5 -p 1-1024 -t 20
114-
```
115-
116-
### Scanning with Protocol Selection
117-
Scan using a specific protocol (TCP or UDP):
118-
```bash
119-
python networksherlock.py 192.168.1.1 -p 53 -P udp
120-
```
121-
122-
### Scan with Shodan
123-
```bash
124-
python networksherlock.py 192.168.1.1 --use-shodan
125-
```
126-
127-
### Scan Multiple Targets with Shodan
128-
```bash
129-
python networksherlock.py 192.168.1.1,192.168.1.2 -p 22,80,443 -V --use-shodan
130-
```
131-
132-
133-
### Banner Grabbing and Save Results
134-
Perform a detailed scan with banner grabbing and save results to a file:
135-
```bash
136-
python networksherlock.py 192.168.1.1 -p 1-1000 -V -s results.txt
137-
```
138-
139-
### Ping Check Before Scanning
140-
Scan an IP range after performing a ping check:
141-
```bash
142-
python networksherlock.py 10.0.0.1-10.0.0.255 -c
143-
```
144-
145-
## OUTPUT EXAMPLE
146-
147-
```bash
148-
$ python3 networksherlock.py 10.0.2.12 -t 25 -V -p 21-6000 -t 25
149-
********************************************
150-
Scanning target: 10.0.2.12
151-
Scanning IP : 10.0.2.12
152-
Ports : 21-6000
153-
Threads : 25
154-
Protocol : tcp
155-
---------------------------------------------
156-
Port Status Service VERSION
157-
22 /tcp open ssh SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1
158-
21 /tcp open telnet 220 (vsFTPd 2.3.4)
159-
80 /tcp open http HTTP/1.1 200 OK
160-
139 /tcp open netbios-ssn %SMBr
161-
25 /tcp open smtp 220 metasploitable.localdomain ESMTP Postfix (Ubuntu)
162-
23 /tcp open smtp #' #'
163-
445 /tcp open microsoft-ds %SMBr
164-
514 /tcp open shell
165-
512 /tcp open exec Where are you?
166-
1524/tcp open ingreslock root@metasploitable:/#
167-
2121/tcp open iprop 220 ProFTPD 1.3.1 Server (Debian) [::ffff:10.0.2.12]
168-
3306/tcp open mysql >
169-
5900/tcp open unknown RFB 003.003
170-
53 /tcp open domain
171-
---------------------------------------------
172-
```
173-
## OutPut Example
174-
```bash
175-
$ python3 networksherlock.py 10.0.2.0/24 -t 10 -V -p 21-1000
176-
********************************************
177-
Scanning target: 10.0.2.1
178-
Scanning IP : 10.0.2.1
179-
Ports : 21-1000
180-
Threads : 10
181-
Protocol : tcp
182-
---------------------------------------------
183-
Port Status Service VERSION
184-
53 /tcp open domain
185-
********************************************
186-
Scanning target: 10.0.2.2
187-
Scanning IP : 10.0.2.2
188-
Ports : 21-1000
189-
Threads : 10
190-
Protocol : tcp
191-
---------------------------------------------
192-
Port Status Service VERSION
193-
445 /tcp open microsoft-ds
194-
135 /tcp open epmap
195-
********************************************
196-
Scanning target: 10.0.2.12
197-
Scanning IP : 10.0.2.12
198-
Ports : 21-1000
199-
Threads : 10
200-
Protocol : tcp
201-
---------------------------------------------
202-
Port Status Service VERSION
203-
21 /tcp open ftp 220 (vsFTPd 2.3.4)
204-
22 /tcp open ssh SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1
205-
23 /tcp open telnet #'
206-
80 /tcp open http HTTP/1.1 200 OK
207-
53 /tcp open kpasswd 464/udpcp
208-
445 /tcp open domain %SMBr
209-
3306/tcp open mysql >
210-
********************************************
211-
Scanning target: 10.0.2.20
212-
Scanning IP : 10.0.2.20
213-
Ports : 21-1000
214-
Threads : 10
215-
Protocol : tcp
216-
---------------------------------------------
217-
Port Status Service VERSION
218-
22 /tcp open ssh SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.9
219-
```
86+
Here are some usage examples of NetworkSherlock: [You can explore it here](https://denizhalil.com/2023/11/27/dosinator-denial-of-service-tool/)
22087

22188
## Contributing
22289
Contributions are welcome! To contribute to NetworkSherlock, follow these steps:

0 commit comments

Comments
 (0)