____
/ _/___ _______ ________________ ________
/ // __ \/ ___/ / / / ___/ ___/ __ \/ ___/ _ \
_/ // / / / /__/ /_/ / / (__ ) /_/ / / / __/
/___/_/ /_/\___/\__,_/_/ /____/\____/_/ \___/
@wirzka
Incursore will raid the target for you.
It came out from nmapAutomator to be more suited for the OSCP environment.
- Lazy here
- Features and changes
- Requirements
- Installation
- Usage
- Future features
- Incursore in the wild
- Disclaimer
While incursore has born from nmapAutomator, it is not nmapAutomator. The script from @21y4d is great, but sometimes it's too slow (due to nikto). By removing it, the time needed to complete a scan has been drastically reduced. So, from just removing nikto I found myself tweaking it a lot, that's why I decided to rename it to incursore and to publish it under a new repo and name. Hope you'll find it useful.
Bear in mind that I'm still working on it.
Incursore has the following features and changes:
- It immmediately runs a full TCP port scans
- It asks to the user to run with sudo in order to run a SYN Scan instead of a Connect Scan
- It automatically tries to bruteforce FTP services
- It automatically takes screenshot of HTTP homepages using cutycapt
- It runs ffuf instead of gobuster
- It does not run nikto
- It has not the remote capabilities
- It highlights target IP
- It highlights target OS type
- It highlights nmap scan type
Incursore's requirements are the following:
tool | scope | official link |
---|---|---|
nmap | recon/enum | https://nmap.org/ |
nmap vulners | recon | https://github.com/vulnersCom/nmap-vulners |
ffuf | web enum | https://github.com/ffuf/ffuf |
sslscan | web enum | https://github.com/rbsec/sslscan |
joomscan | web enum | https://github.com/OWASP/joomscan |
wpscan | web enum | https://github.com/wpscanteam/wpscan |
droopescan | web enum | https://github.com/droope/droopescan |
cutycapt | web enum | http://cutycapt.sourceforge.net/ |
smbmap | smb enum | https://github.com/ShawnDEvans/smbmap |
enum4linux | smb enum | https://github.com/CiscoCXSecurity/enum4linux |
snmp-check | snmp enum | https://www.nothink.org/codes/snmpcheck/index.php |
snmpwalk | snmp enum | https://linux.die.net/man/1/snmpwalk |
odat | oracle db recon | https://github.com/quentinhardy/odat |
ldapsearch | ldap enum | https://linux.die.net/man/1/ldapsearch |
dnsrecon | dns enum | https://github.com/darkoperator/dnsrecon |
smtp-user-enum | smtp enum | https://github.com/pentestmonkey/smtp-user-enum |
hydra | ftp bruteforce | https://github.com/vanhauser-thc/thc-hydra |
The majority of them is already present in pentesting distro like Parrot OS and Kali Linux. To find out how many of them are missing on your machine, just launch a which command like this:
$ which nmap ffuf sslscan joomscan wpscan droopescan cutycapt smbmap enum4linux snmp-check snmpwalk odat ldapsearch dnsrecon smtp-user-enum hydra
git clone https://github.com/wirzka/incursore.git
sudo ln -s $(pwd)/incursore/incursore.sh /usr/local/bin/
$ incursore.sh -h
____
/ _/___ _______ ________________ ________
/ // __ \/ ___/ / / / ___/ ___/ __ \/ ___/ _ \
_/ // / / / /__/ /_/ / / (__ ) /_/ / / / __/
/___/_/ /_/\___/\__,_/_/ /____/\____/_/ \___/
@wirzka
Usage: incursore.sh -H/--host <TARGET-IP> -t/--type <TYPE>
Optional: [-d/--dns <DNS SERVER>] [-o/--output <OUTPUT DIRECTORY>]
Scan Types:
Port : Shows all open ports
Script : Runs a script scan on found ports
UDP : Runs a UDP scan "requires sudo"
Vulns : Runs CVE scan and nmap Vulns scan on all found ports
Recon : Suggests recon commands, then prompts to automatically run them
All : Runs all the scans
inspired by @21y4d gently modified by @wirzka
- Generally increasing auto reconnaissance based on discovered services.
Thanks to everyone for spending some times trying, using, and enhancing Incursore <3:
I am not responsible for any damages (tangible or intangible) resulting from the use of incursore. You must have the permissions to use it.
Stay safe.