commands.sh

nettacker

all

Automate information gathering, vulnerability scanning and eventually generate a report.

More info →

Options (4)

-m, --modulesboolean

Run a port scan on targets

Example: nettacker {{[-m|--modules]}} port_scan {{[-i|--targets]}} {{192.168.0.1/24,owasp.org,scanme.org,...}}
-i, --targetsboolean

Run a port scan on targets

Example: nettacker {{[-m|--modules]}} port_scan {{[-i|--targets]}} {{192.168.0.1/24,owasp.org,scanme.org,...}}
-g, --portsboolean

Run a port scan on specific ports and targets listed in a file (newline separated)

Example: nettacker {{[-m|--modules]}} port_scan {{[-g|--ports]}} {{22,80,443,...}} {{[-l|--targets-list]}} {{path/to/targets.txt}}
-l, --targets-listboolean

Run a port scan on specific ports and targets listed in a file (newline separated)

Example: nettacker {{[-m|--modules]}} port_scan {{[-g|--ports]}} {{22,80,443,...}} {{[-l|--targets-list]}} {{path/to/targets.txt}}

Examples (4)

List all available modules

nettacker --show-all-modules

Run a port scan on targets

nettacker [-m|--modules] port_scan [-i|--targets] 192.168.0.1/24,owasp.org,scanme.org,...

Run a port scan on specific ports and targets listed in a file (newline separated)

nettacker [-m|--modules] port_scan [-g|--ports] 22,80,443,... [-l|--targets-list] path/to/targets.txt

Run ping test before scan and then run multiple scan types on target

nettacker --ping-before-scan [-m|--modules] port_scan,subdomain_scan,waf_scan,... [-g|--ports] 80,443 [-i|--targets] owasp.org
made by @shridhargupta | data from tldr-pages