[short_descr]
Automates the search for network vulnerabilities, designed for pentesters, Red Team operators, (https://t.me/hackgit) and network security engineers.
[/short_descr]
[long_descr]
Above
Network Vulnerability Scanner by Caster
Automates the search for network vulnerabilities, designed for pentesters, Red Team operators, and network security engineers
usage: Above.py [-h] --interface INTERFACE --timeout TIMEOUT [--resolve-mac] [--promisc-linux] [--cdp] [--dtp] [--mndp] [--macsec] [--pvst] [--lldp] [--ospf] [--eigrp] [--esrp] [--edp] [--vrrp] [--hsrp]
[--stp] [--glbp] [--llmnr] [--nbns] [--mdns] [--dhcpv6] [--fullscan]
options:
-h, --help show this help message and exit
--interface INTERFACE
Specify your interface
--timeout TIMEOUT Specify the timeout. How much time to sniff
--resolve-mac Resolve hardware MAC or not
--promisc-linux Enable promisc mode for interface
--cdp CDP Scan
--dtp DTP Scan
--mndp MNDP Scan
--macsec MACSec Scan
--pvst PVST Scan
--lldp LLDP Scan
--ospf OSPF Scan
--eigrp EIGRP Scan
--esrp ESRP Scan
--edp EDP Scan
--vrrp VRRP Scan
--hsrp HSRP Scan
--stp STP Scan
--glbp GLBP Scan
--llmnr LLMNR Scan
--nbns NBNS Scan
--mdns MDNS Scan
--dhcpv6 DHCPv6 Scan
--fullscan Scan all protocols
Mechanics
This script is based on a sniff of network traffic. "Above" is fully autonomous and works in passive mode, creating no noise on the air.
Since the 2.0 release, it supports 18 protocols
When the tool finishes analyzing the protocol, it outputs a little information about its configuration, the impact from the attack, which tool the attacker uses
Install
"Above" requires some dependencies to be installed. If necessary, you can use virtualenv
[homepage] https://github.com/c4s73r/Above [/homepage]
[tags] above, vunerability, scanner [/tags]
[short_descr] Automates the search for network vulnerabilities, designed for pentesters, Red Team operators, (https://t.me/hackgit) and network security engineers. [/short_descr]
[long_descr]
Above
Network Vulnerability Scanner by Caster
Automates the search for network vulnerabilities, designed for pentesters, Red Team operators, and network security engineers
Mechanics
This script is based on a sniff of network traffic. "Above" is fully autonomous and works in passive mode, creating no noise on the air.
Since the 2.0 release, it supports 18 protocols
The scanner waits for the following arguments as input:
Example (OSPF and VRRP protocol scan):
Full scan example:
When the tool finishes analyzing the protocol, it outputs a little information about its configuration, the impact from the attack, which tool the attacker uses
Install
"Above" requires some dependencies to be installed. If necessary, you can use virtualenv
[/long_descr]
[image]
[/image]