Skip to content

cyberok-org/udp_amplificat0r

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

udp_scan

  • Generate bash-script to scan your infrastructure
  • Get probes.go file for udpx project
  • Get nmap-payloads from all collected probes
  • Get nmap-payloads for specific rarity, according to nmap-service-probes file

About file ./udp_scan/ports:
You may use the file from this repository or set only ports of your interest. For example, leave only port 443 in that file.

About file ./udp_scan/targets/TARGETS:
It's a folder, where your scope should lie. For example, it might look like this:

333.333.333.333/32
444.444.444.444/16
555.555.555.555/24
etc

About folder ./udp_scan/results:
After launching the generated script, the results will be written right to that folder.

Usage:

Help:
        python3 udp_scan.py [PARAM] [OPTIONS]

To generate script to scan with ZMAP:
        python3 udp_scan.py --generate-scan zmap

To generate script to scan with MASSCAN:
        python3 udp_scan.py --generate-scan masscan

To generate file with probes in UDPX format:
        python3 udp_scan.py --get-probes udpx

To generate file with probes in NMAP-PAYLOADS format:
        python3 udp_scan.py --get-probes nmap-payloads

To generate file with probes in NMAP-PAYLOADS format with exact RARITY:
        python3 udp_scan.py --get-probes nmap-payloads 1

amplificat0r

Put results of scan into ./amlificat0r/results and run amplificat0r.py:

Usage:
        python3 amplificat0r.py [MODE] [LIMIT]

To check scope for IPs who show looped behavior, responding over 100 times: 
        python3 amplificat0r.py --looped-ips 100

To check scope for IPs who have responded with banners, bigger than 1000 bytes: 
        python3 amplificat0r.py --big-banners 1000

nmap-service-probes_udp_only_recasted

It's a recasted by CyberOK version of file nmap-service-probes. Some ports added to probes and rarities of some probes are incremented. The list of recasts is mentioned at the beginning of the file. You can use it with nmap or use it with udp_scan/udp_scan.py tool. To use this file with udp_scan.py tool, just put it into ./udp_scan folder and rename to nmap-service-probes.

get_ascii

The get_ascii.py script reads hex results of scan and interprets them as readable text, if possible. Sometimes, UDP banners may hold human-readable information like vendor, model, version, hostname, etc. You can use this script to analyze the results of zmap scan and see if some human-readable information is in place.

Usage:
        python3 get_ascii.py ZMAP_RESULTS_FILE.result
Example:
        python3 get_ascii.py /results/27015-STEAM_nmap_payloads.result

        192.168.0.1:I0 101FPS [CSDM] de_go_go_go cstrike Counter-Strike dl 1.1.2.7/Stdio i
        192.168.0.2:I CSS{V34}( ) [18+] cs_office cstrike Protected by Kigen's Anti-Cheat dl 1.0.0.34
        192.168.0.3:m37.230.137.89:27015 css_train cstrike Counter-Strike /dl
...

Disclaimer: All materials and tools are provided to community only for use in educational puprose. Analyze only systems, you own or have authorized access to.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published