-
Notifications
You must be signed in to change notification settings - Fork 0
Home
The short version is on the README of Spitzer. this will be a expanded version of that explanation.
First, you'll need to clone to project and install it:
git clone https://github.com/Riqky/Spitzer
cd Spitzer
pip3 install .
These command's are untested on anything other than Kali, so necessary usage of sudo
is unknown.
Now, you should be able to start the script:
spitzer
It will show some ASCII-art, and probably a orange warning about the IP or Interface. You can ignore the warning for now, we'll get to this later.
For now just type help
. This will show you a list of the available command's. help <command>
will give you more info about the command.
For even more info per command, see Usage
Now, first we need to set everything you need to scan. Do this by running the options
command. This will give an output similar to this:
> options
ip 10.10.10.0/24 The ip-adress or CIDR to scan
nmapFlags -sC Flags used by nmap (-sV and -Pn are added automatically)
ports top1 amount of ports to scan, top1 equals top1000 and top10 equals top10000. options: top1, top10, all, list or an format accepted by nmap
wordlist common wordlist for dirb
interface tun0 The interface that can reach the ip
verbose 2 The verbosity of the tools. Options: -1, 0, 1 etc. -1 is no output, anything above 0 is the amount of added v's
times 2 Amount of times to run Masscan
rate 10000 Rate for Masscan to use
threads 5 The amount of threads the multiprocessed tool use
categories safe safe, heavy and/or intrusive. Defines how heavy the exploits can go
In order to scan a range or target, set interface
and ip
to the correct values. The rest doesn't matter yet. As soon as you set your interface, Spitzer will change your ip to the current range of this interface. If you want to scan a single host, or don't want to use Masscan, you can set the times
to 0.
Next, we run the scan. You can only scan the network with scan
, as soon as the scanning is done, you can check the results for exploits with exploit
. Or you can run both commands with run
.