Kali Linux Tutorials - Sandmap - Nmap Automation Tool - Kali Linux Command




What is Sandmap ?

  • Sandmap is a security tool supporting network & system reconnaissance using Nmap (network discovery and security auditing).
  • It is User-friendly-interface and speed up scanning.
  • It is used to allow many advanced scanning techniques.
  • There are some features available, which includes predefined scans, multiple scans and to support Nmap Scripting Engine.
 sandmap

Learn Ethical Hacking - Ethical Hacking tutorial - Sandmap - Ethical Hacking examples - Ethical Hacking programs

Alternatives of Sandmap :

Recon-ng

  • Recon-ng is a full-featured web reconnaissance frame work. It was developed by Tim Tomes.
  • It is written in Python. This tool is focused on web-based open-source reconnaissance. It is modular framework and easy to access by new python developers.
  • It is used for penetration testing and security assessments. It is similar to Metasploit framework.
 recon ng

Learn Ethical Hacking - Ethical Hacking tutorial - Recon-ng - Ethical Hacking examples - Ethical Hacking programs

0TRACE.PY

  • 0TRACE.PY is hop enumeration & security tool , which is developed by Michal zalewaki. It is a python port.
  • It performs reconnaissance and hop enumeration (similar to traceroute).
  • It uses established TCP connection.
  • It is used to gather information about network.
 trace py

Learn Ethical Hacking - Ethical Hacking tutorial - 0TRACE.PY - Ethical Hacking examples - Ethical Hacking programs

Detectem

  • Detectem is a vulnerability detection system, which is used for get software information. It has features of Command line interface and JSON output supported.
  • It is written in python and it is very much helpful in penetration testing.
  • It is used for the purposes: Application testing , Vulnerability scanning.
 detectem

Learn Ethical Hacking - Ethical Hacking tutorial - Detectem - Ethical Hacking examples - Ethical Hacking programs

Gitem

  • Gitem is a reconnaissance tool, which is used to extract information and it is written in python
  • It is developed by Matt Schwager.
  • It is used to find the leaking of sensitive data, security assessment, security monitoring.
 Gitem

Learn Ethical Hacking - Ethical Hacking tutorial - Gitem - Ethical Hacking examples - Ethical Hacking programs

Step by Step Procedure :

Step 1:

 open terminal

Learn Ethical Hacking - Ethical Hacking tutorial - Open Terminal - Ethical Hacking examples - Ethical Hacking programs

Step 2:

  • Type sandmap command to open sandmap tool.
 type sandmap

Learn Ethical Hacking - Ethical Hacking tutorial - Type Sandmap - Ethical Hacking examples - Ethical Hacking programs

  • The sandmap page will be loading.
 loading modules

Learn Ethical Hacking - Ethical Hacking tutorial - Loading Modules - Ethical Hacking examples - Ethical Hacking programs

Step 3:

  • The sandmap interface is displayed which is to automate, speed up scanning & allow to use advanced scanning. Type help command to view the help commands.
 type help

Learn Ethical Hacking - Ethical Hacking tutorial - Type help - Ethical Hacking examples - Ethical Hacking programs

  • Help commands are Displayed. They are mentioned below:
    • help - Show cli help or module help
    • list - Show available modules
    • config - Show global or module configuration
    • set - set global or module variable value
    • use - Use module
    • pushd - Command line commands stack
    • search - Search key in all commands
    • reload - Reload all modules cache or configuration
    • banner - Show banner
 help commands displayed

Learn Ethical Hacking - Ethical Hacking tutorial - Help commands displayed - Ethical Hacking examples - Ethical Hacking programs

Step 4:

  • Type list command to view all modules.
 type list to view modules

Learn Ethical Hacking - Ethical Hacking tutorial - Type list to view modules - Ethical Hacking examples - Ethical Hacking programs

  • Select host_discovery option for discovering host details.
 select host discovery

Learn Ethical Hacking - Ethical Hacking tutorial - Select Host Discovery - Ethical Hacking examples - Ethical Hacking programs

Step 5:

  • Type use host_discovery command for discovering particular host details.
 use host discovery

Learn Ethical Hacking - Ethical Hacking tutorial - Use host discovery - Ethical Hacking examples - Ethical Hacking programs

Step 6:

 set target

Learn Ethical Hacking - Ethical Hacking tutorial - Set target - Ethical Hacking examples - Ethical Hacking programs

  • Type show command for alias, which means attacking commands.
 type show to view attacking commands

Learn Ethical Hacking - Ethical Hacking tutorial - Type show to view attacking commands - Ethical Hacking examples - Ethical Hacking programs

  • The attacking commands are displayed. They are the following terms:
    • list_scan
    • ping_scan
    • no_port_scan
    • tcp_syn_ping
    • udp_ping
    • tcp_ack_ping
    • sctp_init_ping
    • arp_ping
    • icmp_ping-1
    • icmp_ping-2
    • icmp_ping-3
 ping command

Learn Ethical Hacking - Ethical Hacking tutorial - Ping command - Ethical Hacking examples - Ethical Hacking programs

Step 7:

  • Type init 0 command to initiate the list_scan command's ID number.
 list scan

Learn Ethical Hacking - Ethical Hacking tutorial - List scan - Ethical Hacking examples - Ethical Hacking programs

  • The output is displayed and also Nmap command appeared as nmap -sL www.wikitechy.com
 nmap command

Learn Ethical Hacking - Ethical Hacking tutorial - Nmap command - Ethical Hacking examples - Ethical Hacking programs

Step 8:

  • Type init 8 command for arp_ping ( Address resolution protocol ping which is used to discover link layer address ) and the result is displayed.
 ping command

Learn Ethical Hacking - Ethical Hacking tutorial - Ping command - Ethical Hacking examples - Ethical Hacking programs

Step 9:

  • Type init 8 command ( ihttp-config-backup ) which is to get some cookies values.
 http config backup

Learn Ethical Hacking - Ethical Hacking tutorial - Http config backup - Ethical Hacking examples - Ethical Hacking programs

  • The output of http-config-backup command is displayed. This site address doesn’t show any cookies values, which means the site is protected.
 http config backup command

Learn Ethical Hacking - Ethical Hacking tutorial - Http config backup command - Ethical Hacking examples - Ethical Hacking programs

Step 10:

  • Type init 20 command ( http-frontpage-login ) which is to get login details and the output are displayed.
 http front page login

Learn Ethical Hacking - Ethical Hacking tutorial - Http front page login - Ethical Hacking examples - Ethical Hacking programs

Step 11:

  • Type init 47 command ( http-vhosts ) which is to view verbose status code and the outputs are displayed.
 http yhosts

Learn Ethical Hacking - Ethical Hacking tutorial - Http yhosts - Ethical Hacking examples - Ethical Hacking programs

Step 12:



Related Searches to Sandmap - Nmap Automation Tool

Adblocker detected! Please consider reading this notice.

We've detected that you are using AdBlock Plus or some other adblocking software which is preventing the page from fully loading.

We don't have any banner, Flash, animation, obnoxious sound, or popup ad. We do not implement these annoying types of ads!

We need money to operate the site, and almost all of it comes from our online advertising.

Please add wikitechy.com to your ad blocking whitelist or disable your adblocking software.

×