CyberScan is an open source penetration testing tool that can analyze packets, decoding, scanning ports, pinging and geolocation of an IP including (latitude, longitude, region, country …)
Installation
Operating Systems Supported
Windows XP/7/8/8.1/10
GNU/Linux
MacOSX
git clone https://github.com/medbenali/CyberScan.git
cd CyberScan/
python CyberScan.py -v
Usage
Pinging The Network
We can perform ping operations with several protocols using CyberScan The fastest way to discover hosts on a local Ethernet network is to use ARP:
ARP Ping
$ CyberScan -s 192.168.1.0/24 -p arp
[*] Starting Ping ARP for 192.168.1.0/24
Begin emission:
Finished to send 256 packets.
Received 0 packets, got 0 answers, remaining 256 packets
ICMP Ping
In other cases we can use ICMP ping:
$ CyberScan -s 192.168.1.1-254 -p icmp
[*] Starting Ping ARP for 192.168.1.0/24
Begin emission:
Finished to send 256 packets.
Received 0 packets, got 0 answers, remaining 256 packets
TCP Ping
In case when ICMP echo requests are blocked, we can still use TCP:
$ CyberScan -s 192.168.1.1-254 -p tcp -d 80
UDP Ping
Or even UDP (which produces ICMP port unreachable errors from live hosts). We can pick any port which is most likely to be closed, such as port 0:
$ CyberScan -s 192.168.*.1-10 -p udp
Network Scanning
Port Scanner
In CyberSan Tool we can scan with or without specifying start and end port
$ CyberScan -s 192.168.1.1 -p scan -d 1 -t 100
WARNING: No route found for IPv6 destination :: (no default route?)
[*] CyberScan Port Scanner
[*] Scanning 192.168.1.1 From Port 1 To 100:
[*] Starting CyberScan 1.01 at 2017-07-14 14:00 CEST
[*] Scan In Progress ...
[*] Connecting To Port : 100
[*] Scanning Completed at 2017-07-14 14:00 CEST
[*] CyberScan done: 1IP address (1host up) scanned in 0.32 seconds
[*] Open Ports:
23 TELNET: Open
53 DNS: Open
Geolocalisation IP
Analyzing and Decoding Packets
CyberScan can analyse pcap files in order to extract and decode ethernet ,ip , tcp , icmp ,udp headrers .
Ethernet Headers
$ CyberScan -f test.pcap -p eth
WARNING: No route found for IPv6 destination :: (no default route?)
----------------------------------------
[*] Packet : 1
[+] ### [ Ethernet ] ###
[*] Mac Destination : 00:1f:f3:3c:e1:13
[*] Mac Source : f8:1e:df:e5:84:3a
[*] Ethernet Type : 2048