top of page

DRACNMAP SERIES 1

  • Shah Hardik
  • Mar 25, 2018
  • 2 min read

(You need kali linux to use this spectacular tool) Dracnmap is an open source program primarily used to exploit a network by gathering information with the help of Nmap (which stands for network mapper) . Nmap comes with lots of options through a command line structure, resulting in a utility that is very robust but somewhat difficult to follow for new users. Dracnmap is somewhat of a dashboard and is designed to provide the ability to perform fast scanning using the script engine of Nmap. It enables the ability to more easily perform a variety of automatic scanning techniques by leveraging advanced Nmap commands in the background. In the series We are going to cover the 1st 5 options in Dracnmap, so lets get started

Installation:

1. Clone the tool in whichever Directory you want git clone https://github.com/Screetsec/Dracnmap.git

2. Type cd Dracnmap

3. Type ls and you will see 6 options

4. Type chmod +x dracnmap-v2.2.sh for the root permission and after that type ls, you will see dracnmap-v2.2.sh in green colour

5. Type ./dracnmap-v2.2.sh to run the tool

6. Dracnmap tool will look something like this as shown below

As i mentioned above that we are gonna see the first 5 option in this series, so lets get started

1. Regular scan: In this scan, you can just do a normal scan to find out open port, ip address, dns record etc

2. Scan Multiple Ip address: In this scan, you can scan 3 target at a same time to find out open port, ip address, dns record etc

3. Scan os Version and traceroute: In this scan, you can find out targets operating system and their version

4. Find out if a host is protected firewall: In this scan, you can find out other IP addresses of a target and as well as if a target is protected by firewall or no (Filtered means that a firewall, filter, or other network obstacle is blocking the port)

5. Evading firewall: Many firewalls and routers block or drop the ICMP (echo request and echo reply) ping. This is meant to obscure the presence of the hosts behind the firewall and protect against a possible DoS using the ping packet. When you use Nmap to scan a system or network, by default, it sends out a ping to see if the host is up. If it gets a response, it then sends the specified packets to scan the system. If the ping is blocked or dropped, Nmap gives up and says, host is down. To get around firewalls and routers that block or drop the ping, we need to suppress Nmap's default behavior of sending out that initial ping and get past the firewall that is blocking us. We can do this by evading firewalls


 
 
 

Commentaires


Featured Posts

Recent Posts

Archive

Follow Us

  • Facebook Basic Square

©2018 BY FREEHACKGUIDE.

bottom of page