All Projects → goldfiglabs → sgCheckup

goldfiglabs / sgCheckup

Licence: MPL-2.0 license
sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.

Programming Languages

go
31211 projects - #10 most used programming language
HTML
75241 projects
shell
77523 projects
PLpgSQL
1095 projects

Projects that are alternatives of or similar to sgCheckup

introspector
A schema and set of tools for using SQL to query cloud infrastructure.
Stars: ✭ 61 (-20.78%)
Mutual labels:  secops, infosec, security-groups, cloud-security
Biu
网络资产发现、漏洞扫描
Stars: ✭ 199 (+158.44%)
Mutual labels:  scanner, nmap
magicRecon
MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
Stars: ✭ 478 (+520.78%)
Mutual labels:  scanner, infosec
Sec Admin
分布式资产安全扫描核心管理系统(弱口令扫描,漏洞扫描)
Stars: ✭ 222 (+188.31%)
Mutual labels:  scanner, infosec
nmap-formatter
A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot). Simply put it's nmap converter.
Stars: ✭ 129 (+67.53%)
Mutual labels:  scanner, nmap
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+2268.83%)
Mutual labels:  scanner, nmap
Pycurity
Python Security Scripts
Stars: ✭ 218 (+183.12%)
Mutual labels:  scanner, nmap
Routersploit
Exploitation Framework for Embedded Devices
Stars: ✭ 9,866 (+12712.99%)
Mutual labels:  scanner, infosec
Recon-X
Advanced Reconnaissance tool to enumerate attacking surface of the target.
Stars: ✭ 27 (-64.94%)
Mutual labels:  scanner, nmap
porteye
Detect alive host and open port .
Stars: ✭ 17 (-77.92%)
Mutual labels:  scanner, nmap
N-WEB
WEB PENETRATION TESTING TOOL 💥
Stars: ✭ 56 (-27.27%)
Mutual labels:  scanner, nmap
Penta
Open source all-in-one CLI tool to semi-automate pentesting.
Stars: ✭ 130 (+68.83%)
Mutual labels:  scanner, nmap
Nwatch
🔍 Tool for - Host Discovery, Port Scanning and Operating System Fingerprinting
Stars: ✭ 127 (+64.94%)
Mutual labels:  scanner, nmap
Unimap
Scan only once by IP address and reduce scan times with Nmap for large amounts of data.
Stars: ✭ 141 (+83.12%)
Mutual labels:  scanner, nmap
Analyst Arsenal
A toolkit for Security Researchers
Stars: ✭ 112 (+45.45%)
Mutual labels:  scanner, infosec
Bscan
an asynchronous target enumeration tool
Stars: ✭ 207 (+168.83%)
Mutual labels:  scanner, nmap
Snoop
Snoop — инструмент разведки на основе открытых данных (OSINT world)
Stars: ✭ 886 (+1050.65%)
Mutual labels:  scanner, infosec
Jaeles
The Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+1293.51%)
Mutual labels:  scanner, infosec
Rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+4366.23%)
Mutual labels:  scanner, infosec
sx
🖖 Fast, modern, easy-to-use network scanner
Stars: ✭ 1,267 (+1545.45%)
Mutual labels:  scanner, infosec

sgCheckup - Check your Security Groups for Unexpected Open Ports & Generate nmap Output

sgcheckup copy

sgCheckup is a tool to scan your AWS Security Groups for a combination of open ports and attached Network Interfaces. The goal is to find anything listening on a port that you wouldn't consider safe. In addition to generating reports for security groups, sgCheckup can generate and run nmap to get specifics.

Why?

Security Groups are an important line of defense for your infrastructure, but as you make changes, it's easy to forget to revert some quick fix that was made to get something working. Having a view into what ports are open and what's listening can help you prioritize locking down access. Using nmap to pinpoint specifics as well as fingerprint the open ports further aides with context in locking down security groups.

Pre-requisites

  • AWS Credentials (~/.aws/, AWS_* environment variables, metadata server, etc.)
  • Docker
  • If running from source, go version >= go1.15

Installation Options

  1. Download the latest release:

Linux:

    curl -Lo sgCheckup https://github.com/goldfiglabs/sgCheckup/releases/latest/download/sgCheckup_linux
    chmod a+x ./sgCheckup

OSX x86:

    curl -Lo sgCheckup https://github.com/goldfiglabs/sgCheckup/releases/latest/download/sgCheckup_darwin_amd64
    chmod a+x ./sgCheckup

OSX M1/arm:

    curl -Lo sgCheckup https://github.com/goldfiglabs/sgCheckup/releases/latest/download/sgCheckup_darwin_arm64
    chmod a+x ./sgCheckup
  1. Run from source:
    git clone https://github.com/goldfiglabs/sgCheckup.git
    cd sgCheckup
    go run main.go
    

Usage

Run ./sgCheckup and view the reports generated in output/.

Screen Shot 2021-08-31 at 3 08 35 PM

nmap results are in output/nmap/ with a summary cross-referencing security groups found in nmap.html:

Screen Shot 2021-09-01 at 1 54 06 PM

Overview

sgCheckup uses goldfiglabs/introspector to snapshot the Security Groups and Network Interfaces from your AWS Account into a Postgres database. sgCheckup then runs SQL queries to look for Security Groups with open ports and attached Network Interfaces. This list is then used to configure running nmap against the targeted list of IPs and ports. The output of nmap is used to determine if a) anything is listening and b) what software is listening on open ports.

Notes

  1. 2 HTML and CSV reports are provided: one each organized by Security Group, and one each organized by IP/Port combination.

  2. By default, sgCheckup considers ports 22, 80, and 443 to be open intentionally. You can use the flag -safePorts <comma-separated port list> to override this behavior according to your own policies. Use --safe-ports "" to mark all ports unsafe.

  3. You can skip the nmap phase with -skip-nmap. You will still get the report focused on Security Groups, but not the report based on open IP/Port combinations.

License

Copyright (c) 2021 Gold Fig Labs Inc.

This Source Code Form is subject to the terms of the Mozilla Public License, v.2.0. If a copy of the MPL was not distributed with this file, You can obtain one at http://mozilla.org/MPL/2.0/.

Mozilla Public License v2.0

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].