-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathport-scanner.sh
107 lines (103 loc) · 2.29 KB
/
port-scanner.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
#!/bin/bash
echo """
@@@@@@@ @@@@@@ @@@@@@@ @@@@@@@
@@! @@@ @@! @@@ @@! @@@ @!!
@!@@!@! @!@ !@! @!@!!@! @!!
!!: !!: !!! !!: :!! !!:
: : :. : : : : :
MADE BY HASH2602
"""
read -p "Please enter the IP address or network range: " ip
echo ""
echo "{1} BASIC SCAN"
echo "{2} SPECIFIC PORT SCAN"
echo "{3} SCAN ALL PORTS"
echo "{4} SERVICE AND VERSION INFO"
echo "{5} OS DETECTION"
echo "{6} SYN SCAN"
echo "{7} UDP SCAN"
echo "{8} AGGRESSIVE SCAN"
echo "{9} PING SWEEP"
echo "{10} SCAN SPECIFIC HOSTS"
echo "{11} LIST OPEN PORTS"
echo "{12} SAVE OUTPUT IN NORMAL FORMAT"
echo "{13} SAVE OUTPUT IN XML FORMAT"
echo "{14} SCAN PORT RANGE"
echo "{15} TCP CONNECT SCAN"
echo "{16} FIREWALL DETECTION"
echo "{17} SCAN MULTIPLE TARGETS FROM FILE"
echo "{18} IP PROTOCOL SCAN"
echo "{19} TCP ACK SCAN"
echo "{20} FIN SCAN"
read -p "Select the scan you want to perform: " choice
case $choice in
1)
nmap $ip
;;
2)
read -p "Please enter the ports (e.g., 80,443): " ports
nmap -p $ports $ip
;;
3)
nmap -p- $ip
;;
4)
nmap -sV $ip
;;
5)
nmap -O $ip
;;
6)
nmap -sS $ip
;;
7)
nmap -sU $ip
;;
8)
nmap -A $ip
;;
9)
nmap -sn $ip
;;
10)
read -p "Please enter the host names: " hosts
nmap -p 22 --open $hosts
;;
11)
nmap --open $ip
;;
12)
read -p "Please enter the output file name: " output
nmap -oN $output $ip
;;
13)
read -p "Please enter the output file name: " output
nmap -oX $output $ip
;;
14)
read -p "Please enter the port range (e.g., 1-65535): " port_range
nmap -p $port_range $ip
;;
15)
nmap -sT $ip
;;
16)
nmap -PN $ip
;;
17)
read -p "Please enter the file name containing targets: " target_file
nmap -iL $target_file
;;
18)
nmap -sO $ip
;;
19)
nmap -sA $ip
;;
20)
nmap -sF $ip
;;
*)
echo "Invalid choice!"
;;
esac