Closed eviltik closed 9 years ago
option --whoami will produce, when possible, what is behind an opened port.Example
{iam:"socks proxy"}. {iam:"http server"}. {iam:"tor proxy"}.
The lookup will be first based on the IANA official port list, then, have to go deeper in the scan and test different protocol ..
Not a little thing. Wondering if this job should be more related to another hypothetical tool. i.e
root@debian~# evilscan 192.168.0/14 --port=0-65535 --json | evilsomething --json {"ip":"192.168.1.254","port":"80","iam":"http server"}
cleanup
option --whoami will produce, when possible, what is behind an opened port.Example
The lookup will be first based on the IANA official port list, then, have to go deeper in the scan and test different protocol ..
Not a little thing. Wondering if this job should be more related to another hypothetical tool. i.e