All Projects → medbenali → Cyberscan

medbenali / Cyberscan

Licence: gpl-3.0
CyberScan: Network's Forensics ToolKit

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Cyberscan

Scapy
Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
Stars: ✭ 6,932 (+2375.71%)
Mutual labels:  network-analysis, network-security, network-visualization
Netvisix
Netvisix visualizes the network packet flow between hosts
Stars: ✭ 65 (-76.79%)
Mutual labels:  network-visualization, network-analysis
multigraph
multigraph: Plot and Manipulate Multigraphs in R
Stars: ✭ 18 (-93.57%)
Mutual labels:  network-visualization, network-analysis
VOSviewer-Online
VOSviewer Online is a tool for network visualization. It is a web-based version of VOSviewer, a popular tool for constructing and visualizing bibliometric networks.
Stars: ✭ 44 (-84.29%)
Mutual labels:  network-visualization, network-analysis
Graphlayouts
new layout algorithms for network visualizations in R
Stars: ✭ 176 (-37.14%)
Mutual labels:  network-analysis, network-visualization
Awesome Network Analysis
A curated list of awesome network analysis resources.
Stars: ✭ 2,525 (+801.79%)
Mutual labels:  network-analysis, network-visualization
NETNOOB
A simple program written in bash that contains basic Linux network tools, information gathering tools and scanning tools.
Stars: ✭ 105 (-62.5%)
Mutual labels:  network-analysis, information-gathering
Cytoscape.js Expand Collapse
A Cytoscape.js extension to expand/collapse nodes for better management of complexity of compound graphs
Stars: ✭ 83 (-70.36%)
Mutual labels:  network-analysis, network-visualization
Mr.Holmes
🔍 A Complete Osint Tool
Stars: ✭ 307 (+9.64%)
Mutual labels:  geolocation, information-gathering
network-tools
Network Tools
Stars: ✭ 27 (-90.36%)
Mutual labels:  network-analysis, network-security
ObsidianSailboat
Nmap and NSE command line wrapper in the style of Metasploit
Stars: ✭ 36 (-87.14%)
Mutual labels:  service-discovery, information-gathering
Ivre
Network recon framework, published by @cea-sec & @ANSSI-FR. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,331 (+732.5%)
Mutual labels:  network-analysis, network-security
Workbase
Grakn Workbase (Knowledge IDE)
Stars: ✭ 106 (-62.14%)
Mutual labels:  network-analysis, network-visualization
Deepgraph
Analyze Data with Pandas-based Networks. Documentation:
Stars: ✭ 232 (-17.14%)
Mutual labels:  network-analysis, network-visualization
App
free software application for social network analysis and visualization
Stars: ✭ 94 (-66.43%)
Mutual labels:  network-analysis, network-visualization
netplot
Beautiful graph drawing
Stars: ✭ 47 (-83.21%)
Mutual labels:  network-visualization, network-analysis
network-pipeline
Network traffic data pipeline for real-time predictions and building datasets for deep neural networks
Stars: ✭ 36 (-87.14%)
Mutual labels:  network-analysis, network-security
Netdiffuser
netdiffuseR: Analysis of Diffusion and Contagion Processes on Networks
Stars: ✭ 57 (-79.64%)
Mutual labels:  network-analysis, network-visualization
Train Ai With Django Swagger Jwt
Train AI (Keras + Tensorflow) to defend apps with Django REST Framework + Celery + Swagger + JWT - deploys to Kubernetes and OpenShift Container Platform
Stars: ✭ 66 (-76.43%)
Mutual labels:  network-analysis, network-security
ivre
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,712 (+868.57%)
Mutual labels:  network-analysis, network-security

CyberScan

Python 2.6|2.7 License

CyberScan is an open source penetration testing tool that can analyse packets , decoding , scanning ports, pinging and geolocation of an IP including (latitude, longitude , region , country ...)

Screenshots

Screenshot

Operating Systems Supported

  • Windows XP/7/8/8.1/10
  • GNU/Linux
  • MacOSX

Installation

You can download CyberScan by cloning the Git repository:

git clone https://github.com/medbenali/CyberScan.git
cd CyberScan/
python CyberScan.py -v

CyberScan works out of the box with Python version 2.6.x and 2.7.x.

The CyberScan Module Usage

CyberScan is able to send and capture packets of several protocols, forging and decoding them to be used to most network tasks such as scanning, pinging, probing, and attacks.

Make sure you have CyberScan in your machine:

$ git clone https://github.com/medbenali/CyberScan.git

You can test the installation firing up CyberScan iteratively. These are some useful functions:

$ CyberScan -h 

Pinging The Network

We can perform ping operations with several protocols using CyberScan The fastest way to discover hosts on a local Ethernet network is to use ARP:

ARP Ping

$ CyberScan -s 192.168.1.0/24 -p arp
[*] Starting Ping ARP for 192.168.1.0/24
Begin emission:
Finished to send 256 packets.

Received 0 packets, got 0 answers, remaining 256 packets

ICMP Ping

In other cases we can use ICMP ping:

$ CyberScan -s 192.168.1.1-254 -p icmp
[*] Starting Ping ARP for 192.168.1.0/24
Begin emission:
Finished to send 256 packets.

Received 0 packets, got 0 answers, remaining 256 packets

TCP Ping

In case when ICMP echo requests are blocked, we can still use TCP:

$ CyberScan -s 192.168.1.1-254 -p tcp -d 80

UDP Ping

Or even UDP (which produces ICMP port unreachable errors from live hosts). We can pick any port which is most likely to be closed, such as port 0:

$ CyberScan -s 192.168.*.1-10 -p udp

Network Scanning

Port Scanner

In CyberSan Tool we can scan with or without specify start and end port

$ CyberScan -s 192.168.1.1 -p scan -d 1 -t 100
WARNING: No route found for IPv6 destination :: (no default route?)
[*] CyberScan Port Scanner
[*] Scanning 192.168.1.1 From Port 1 To 100: 
[*] Starting CyberScan 1.01 at 2017-07-14 14:00 CEST
[*] Scan In Progress ...
[*] Connecting To Port :  100 
[*] Scanning Completed at 2017-07-14 14:00 CEST
[*] CyberScan done: 1IP address (1host up) scanned in 0.32 seconds
[*] Open Ports: 
	23 TELNET: Open
	53 DNS: Open
	80 HTTP: Open
$ CyberScan -s 8.8.8.8 -p scan
WARNING: No route found for IPv6 destination :: (no default route?)
[*] CyberScan Port Scanner
[*] Scanning For Most Common Ports On 8.8.8.8
[*] Starting CyberScan 1.01 at 2017-07-14 14:03 CEST
[*] Scan In Progress ...
[*] Connecting To Port :  10000 109 110 123 137 138 139 143 156 2082 2083 2086 2087 21 22 23 25 3306 389 546 547 69 80 8443 993 995 
[*] Scanning Completed at 2017-07-14 14:03 CEST
[*] CyberScan done: 1IP address (1host up) scanned in 13.11 seconds
[*] Open Ports: 
	53 DNS: Open
	443 HTTPS: Open

Geolocalisation IP

$ CyberScan -s 72.229.28.185 -p geoip
WARNING: No route found for IPv6 destination :: (no default route?)
[*] IP Address:  72.229.28.185
[*] City:  New York
[*] Region Code:  NY
[*] Area Code:  212
[*] Time Zone:  America/New_York
[*] Dma Code:  501
[*] Metro Code:  New York, NY
[*] Latitude:  40.7605
[*] Longitude:  -73.9933
[*] Zip Code:  10036
[*] Country Name:  United States
[*] Country Code:  US
[*] Country Code3:  USA
[*] Continent:  NA

Analyzing and Decoding Packets

CyberScan can analyse pcap files in order to extract and decode ethernet, ip, tcp, icmp, udp headers.

Ethernet Headers

$ CyberScan -f test.pcap -p eth
WARNING: No route found for IPv6 destination :: (no default route?)
----------------------------------------
[*] Packet : 1
[+] ### [ Ethernet ] ###
[*] Mac Destination : 00:1f:f3:3c:e1:13
[*] Mac Source : f8:1e:df:e5:84:3a
[*] Ethernet Type : 2048

IP Headers

$ CyberScan -f test.pcap -p ip
WARNING: No route found for IPv6 destination :: (no default route?)
----------------------------------------
[*] Packet : 1
[+] ###[ IP ] ###
[*] IP Source : 172.16.11.12
[*] IP Destination : 74.125.19.17
[*] IP Version :  4
[*] IP Ihl :  5
[*] IP Tos :  0
[*] IP Len :  79
[*] IP Id :  56915
[*] IP Flags :  2
[*] IP Frag :  0
[*] IP Ttl :  64
[*] IP Protocol :  6
[*] IP Chksum :  18347
[*] IP Options :  []
[*] IP Dump : 
0000   45 00 00 4F DE 53 40 00  40 06 47 AB AC 10 0B 0C   [email protected]@.G.....
0010   4A 7D 13 11 FC 35 01 BB  C6 D9 14 D0 C5 1E 2D BF   J}...5........-.
0020   80 18 FF FF CB 8C 00 00  01 01 08 0A 1A 7D 84 2C   .............}.,
0030   37 C5 58 B0 15 03 01 00  16 43 1A 88 1E FA 7A BC   7.X......C....z.
0040   22 6E E6 32 7A 53 47 00  A7 5D CC 64 EA 8E 92      "n.2zSG..].d...

TCP Headers

$ CyberScan -f test.pcap -p tcp
WARNING: No route found for IPv6 destination :: (no default route?)
----------------------------------------
[*] Packet : 1
[+] ###[ TCP ] ###
[*] TCP Source Port :  64565
[*] TCP Destination Port :  443
[*] TCP Seq :  3336115408
[*] TCP Ack :  3307089343
[*] TCP Dataofs :  8
[*] TCP Reserved :  0
[*] TCP Flags :  24
[*] TCP Window :  65535
[*] TCP Chksum :  52108
[*] TCP Urgptr :  0
[*] TCP Options :  [('NOP', None), ('NOP', None), ('Timestamp', (444433452, 935680176))]
[*] TCP Dump : 
0000   FC 35 01 BB C6 D9 14 D0  C5 1E 2D BF 80 18 FF FF   .5........-.....
0010   CB 8C 00 00 01 01 08 0A  1A 7D 84 2C 37 C5 58 B0   .........}.,7.X.

UDP Headers

$ CyberScan -f test.pcap -p udp
WARNING: No route found for IPv6 destination :: (no default route?)
----------------------------------------
[*] Packet : 1
[+] ###[ UDP ] ###
[*] UDP Source Port :  54639
[*] UDP Destination Port :  53
[*] UDP Len :  47
[*] UDP Chksum :  30084
[*] UDP Dump : 
0000   D5 6F 00 35 00 2F 75 84  13 A2 01 00 00 01 00 00   .o.5./u.........
0010   00 00 00 00 04 65 38 37  32 01 67 0A 61 6B 61 6D   .....e872.g.akam
0020   61 69 65 64 67 65 03 6E  65 74 00 00 01 00 01      aiedge.net.....

ICMP Headers

$ CyberScan -f test.pcap -p icmp
WARNING: No route found for IPv6 destination :: (no default route?)
----------------------------------------
[*] Packet : 1
[+] ###[ ICMP ] ###
[*] ICMP Type :  3
[*] ICMP Code :  3
[*] ICMP Chksum :  5296
[*] ICMP Id :  None
[*] ICMP Seq :  None
[*] ICMP Dump : 
0000   03 03 14 B0 00 00 00 00  45 00 00 43 C1 80 00 00   ........E..C....
0010   40 11 4A FC AC 10 0B 01  AC 10 0B 0C 00 35 E7 E8   @.J..........5..
0020   00 2F 00 00                                        ./..

Contact

BEN ALI Mohamed

alt text alt text alt text

Email : [email protected]
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].