The Network Automation project team has set out to create a script that scans computer networks and map them in a discrete, speedy, and automatic manner. This will be accomplished with a Raspberry Pi device running the script and several accompanying programs.
The project’s goal is to create a penetration testing tool that will combine programs like Nmap and Nikto to map networks and propagate automated reports about the discovered information. This program will be launched from a Raspberry Pi 2 Model B microcomputing device. While it lacks the powerful hardware found in most workstations, its customizability and portable size make it a perfect fit for our needs.Script Overview
These scanners are extremely beneficial to network administrators: they allow you to scan for potential vulnerabilities and “visualize” their network. As of now, our script accomplishes this by monitoring the following ports: 53, 21-23, 25, 80, 88, 443, 110, 135, 137-139, 1433 and 1434. We choose to scan these ports because of their specific functions, such as port 80. Port 80 is where network traffic is often directed, and is also commonly exploited by attackers.
Now that we have a completed script, we will begin testing it and making sure it works properly. Once we’ve thoroughly tested the script, we will then perform a pen test on the LCDI network and see what we can find! Be on the lookout for our next blog post where we will review our testing phase and discuss any issues we come across.
The LCDI always welcomes feedback! Check us out on Facebook, Twitter, or read our other blogs! We can also be reached by email at: firstname.lastname@example.org.
The post Network Automation Update 1 appeared first on The Leahy Center for Digital Investigation.