From 245b54384d28c6e86285b04ef5346f54a519ec96 Mon Sep 17 00:00:00 2001 From: Random is Resistance Date: Tue, 14 Dec 2021 01:19:51 +0100 Subject: [PATCH] Moving -oA option to standard scan (#49) * move -oA option to standart nmap scan moving -oA option to generate files to the scan of the whole network, not just the interessting hosts. Since e.g. .xml files are more useful for discovery scans of a whole network. * fix fixed borken funktion --- .../payload.sh | 2 ++ 1 file changed, 2 insertions(+) diff --git a/payloads/library/recon/Network-Recon-framework-payload-with-logging-notification-and-exfiltration/payload.sh b/payloads/library/recon/Network-Recon-framework-payload-with-logging-notification-and-exfiltration/payload.sh index 1c46018..f3f8c13 100644 --- a/payloads/library/recon/Network-Recon-framework-payload-with-logging-notification-and-exfiltration/payload.sh +++ b/payloads/library/recon/Network-Recon-framework-payload-with-logging-notification-and-exfiltration/payload.sh @@ -407,6 +407,8 @@ function GRAP_ARP_SCAN_LOOT() { function GRAB_NMAP_LOOT() { if [ "$GRAB_NMAP_LOOT" = "true" ]; then NMAP_LOOT_FILE=$LOOT_DIR/nmap.txt + ### Adding -oA nmap option to scan option + NMAP_OPTIONS_ACTIVE_HOSTS="${NMAP_OPTIONS_ACTIVE_HOSTS} -oA ${LOOT_DIR}/nmap-${SCAN_COUNT}-${TODAY}" touch $NMAP_LOOT_FILE #ACTIVE_HOSTS=( $(nmap $NMAP_QUICKSCAN 192.168.1.0/24 | grep "Nmap scan report for" | awk {'print $5'} | awk '{print}' ORS='\t' | sed 's/.$//') ) # Nmap ping scan output as an array of ip addresses ACTIVE_HOSTS=( $(arp-scan --localnet | tail -n +3 | head -n -3 | awk {'print $1'} | awk '{print}' ORS='\t' | sed 's/.$//') ) # Arp-scan output as an array of ip addresses