@@ -81,142 +81,9 @@ options:
81
81
- ` -c` , ` --ping-check` : Perform a ping check before scanning.
82
82
- ` --use-shodan` : Enable Shodan integration.
83
83
84
- # # Example Usage
84
+ # # Usage Examples
85
85
86
- # ## Basic Port Scan
87
- Scan a single IP address on default ports:
88
- ` ` ` bash
89
- python networksherlock.py 192.168.1.1
90
- ` ` `
91
-
92
- # ## Custom Port Range
93
- Scan an IP address with a custom range of ports:
94
- ` ` ` bash
95
- python networksherlock.py 192.168.1.1 -p 1-1024
96
- ` ` `
97
-
98
- # ## Multiple IPs and Port Specification
99
- Scan multiple IP addresses on specific ports:
100
- ` ` ` bash
101
- python networksherlock.py 192.168.1.1,192.168.1.2 -p 22,80,443
102
- ` ` `
103
-
104
- # ## CIDR Block Scan
105
- Scan an entire subnet using CIDR notation:
106
- ` ` ` bash
107
- python networksherlock.py 192.168.1.0/24 -p 80
108
- ` ` `
109
-
110
- # ## Using Multi-Threading
111
- Perform a scan using multiple threads for faster execution:
112
- ` ` ` bash
113
- python networksherlock.py 192.168.1.1-192.168.1.5 -p 1-1024 -t 20
114
- ` ` `
115
-
116
- # ## Scanning with Protocol Selection
117
- Scan using a specific protocol (TCP or UDP):
118
- ` ` ` bash
119
- python networksherlock.py 192.168.1.1 -p 53 -P udp
120
- ` ` `
121
-
122
- # ## Scan with Shodan
123
- ` ` ` bash
124
- python networksherlock.py 192.168.1.1 --use-shodan
125
- ` ` `
126
-
127
- # ## Scan Multiple Targets with Shodan
128
- ` ` ` bash
129
- python networksherlock.py 192.168.1.1,192.168.1.2 -p 22,80,443 -V --use-shodan
130
- ` ` `
131
-
132
-
133
- # ## Banner Grabbing and Save Results
134
- Perform a detailed scan with banner grabbing and save results to a file:
135
- ` ` ` bash
136
- python networksherlock.py 192.168.1.1 -p 1-1000 -V -s results.txt
137
- ` ` `
138
-
139
- # ## Ping Check Before Scanning
140
- Scan an IP range after performing a ping check:
141
- ` ` ` bash
142
- python networksherlock.py 10.0.0.1-10.0.0.255 -c
143
- ` ` `
144
-
145
- # # OUTPUT EXAMPLE
146
-
147
- ` ` ` bash
148
- $ python3 networksherlock.py 10.0.2.12 -t 25 -V -p 21-6000 -t 25
149
- ********************************************
150
- Scanning target: 10.0.2.12
151
- Scanning IP : 10.0.2.12
152
- Ports : 21-6000
153
- Threads : 25
154
- Protocol : tcp
155
- ---------------------------------------------
156
- Port Status Service VERSION
157
- 22 /tcp open ssh SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1
158
- 21 /tcp open telnet 220 (vsFTPd 2.3.4)
159
- 80 /tcp open http HTTP/1.1 200 OK
160
- 139 /tcp open netbios-ssn %SMBr
161
- 25 /tcp open smtp 220 metasploitable.localdomain ESMTP Postfix (Ubuntu)
162
- 23 /tcp open smtp # ' #'
163
- 445 /tcp open microsoft-ds %SMBr
164
- 514 /tcp open shell
165
- 512 /tcp open exec Where are you?
166
- 1524/tcp open ingreslock root@metasploitable:/#
167
- 2121/tcp open iprop 220 ProFTPD 1.3.1 Server (Debian) [::ffff:10.0.2.12]
168
- 3306/tcp open mysql >
169
- 5900/tcp open unknown RFB 003.003
170
- 53 /tcp open domain
171
- ---------------------------------------------
172
- ` ` `
173
- # # OutPut Example
174
- ` ` ` bash
175
- $ python3 networksherlock.py 10.0.2.0/24 -t 10 -V -p 21-1000
176
- ********************************************
177
- Scanning target: 10.0.2.1
178
- Scanning IP : 10.0.2.1
179
- Ports : 21-1000
180
- Threads : 10
181
- Protocol : tcp
182
- ---------------------------------------------
183
- Port Status Service VERSION
184
- 53 /tcp open domain
185
- ********************************************
186
- Scanning target: 10.0.2.2
187
- Scanning IP : 10.0.2.2
188
- Ports : 21-1000
189
- Threads : 10
190
- Protocol : tcp
191
- ---------------------------------------------
192
- Port Status Service VERSION
193
- 445 /tcp open microsoft-ds
194
- 135 /tcp open epmap
195
- ********************************************
196
- Scanning target: 10.0.2.12
197
- Scanning IP : 10.0.2.12
198
- Ports : 21-1000
199
- Threads : 10
200
- Protocol : tcp
201
- ---------------------------------------------
202
- Port Status Service VERSION
203
- 21 /tcp open ftp 220 (vsFTPd 2.3.4)
204
- 22 /tcp open ssh SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1
205
- 23 /tcp open telnet # '
206
- 80 /tcp open http HTTP/1.1 200 OK
207
- 53 /tcp open kpasswd 464/udpcp
208
- 445 /tcp open domain %SMBr
209
- 3306/tcp open mysql >
210
- ********************************************
211
- Scanning target: 10.0.2.20
212
- Scanning IP : 10.0.2.20
213
- Ports : 21-1000
214
- Threads : 10
215
- Protocol : tcp
216
- ---------------------------------------------
217
- Port Status Service VERSION
218
- 22 /tcp open ssh SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.9
219
- ` ` `
86
+ Here are some usage examples of NetworkSherlock: [You can explore it here](https://denizhalil.com/2023/11/27/dosinator-denial-of-service-tool/)
220
87
221
88
# # Contributing
222
89
Contributions are welcome! To contribute to NetworkSherlock, follow these steps:
0 commit comments