Professional Documents
Culture Documents
Automated Nmap Toolkit
Automated Nmap Toolkit
Farzan Mohammed1, Nor Azlina Abdul Rahman2,Yusnita Yusof3 and Dr Julia Juremi4
2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC) | 978-1-6654-6109-2/22/$31.00 ©2022 IEEE | DOI: 10.1109/ASSIC55218.2022.10088375
1234
Forensic and Cyber Security Research Centre
Asia Pacific University, Technology Park Malaysia, Bukit Jalil, Kuala Lumpur, Malaysia.
1
farzannobi@gmail.com, 2nor_azlina@apu.edu.my, 3yusnita.yusof@gmail.com, 4julia.juremi@apu.edu.my
Abstract— Information gathering is one of the most important to use it or do not know it exists Thus now allowing the user to
methodologies within Cybersecurity allowing pen-testers and gather as much information as he/she can when doing audits or
security researchers to find information about a host or a network. vulnerability research thus resorting to other tools like Nessus
Nmap is one of the most popular information gathering tools for which is Resource heavy while Nmap is highly portable and
finding information about a network or host and it is a highly highly flexible as well.
versatile tool which can be fine grained using the command line.
Now for new students, beginners or script kiddies that come into
cybersecurity fail to use the full functionality of Nmap or fail to 2 Similar Systems
continue forward due the vast versatility of Nmap. This paper
documents how a toolkit based on Nmap is automated to help in 2.1 nmapAutomator
achieving the same results but made so much easier for the user.
The most similar system to Nmap Toolkit is the
Key Term: Nmap, automated toolkit, penetration testing nmapAutomator. It is an automation tool that automates the
process of enumeration & recon. It ensures the automation of
1 Introduction Nmap scans and has a recon scan running in the background as
well. The Automator thus only an initial port scan which then
Information Gathering is the first step to getting into a system later each scan needs to have a manual auto scan done.[1]
and the most used tool is Nmap. If a cybers security professional
can use Nmap to its fullest advantage, then he/she can get
information faster and proceed with further evaluation or attack
of the system without compromising time. The more
information a security professional can gather the easier they
can proceed with the attack.
978-1-6654-8695-8/22/$31.00 ©2022
Authorized licensed use limited IEEE Airlangga. Downloaded on May 05,2024 at 11:12:02 UTC from IEEE Xplore.
to: Universitas Restrictions apply.
2
Figure 2: Sandmap
This survey was sent through multiple sources and from the
data that is collected above we can see there is 77.4% (Male)
Authorized licensed use limited to: Universitas Airlangga. Downloaded on May 05,2024 at 11:12:02 UTC from IEEE Xplore. Restrictions apply.
3
Authorized licensed use limited to: Universitas Airlangga. Downloaded on May 05,2024 at 11:12:02 UTC from IEEE Xplore. Restrictions apply.
4
In this response there is about 95.2% (59 participants) stating Table 2: Result: Response if it was Automated
Yes to it while the rest 4.8% (3 participants) stating No to
having Nmap tool being automated.
Authorized licensed use limited to: Universitas Airlangga. Downloaded on May 05,2024 at 11:12:02 UTC from IEEE Xplore. Restrictions apply.
5
Figure 17: Analysis off Data: Feedback on Nmap being automated Figure 17: Nmap Toolkit: Access Control
Almost all the responses here was that it would be great to After it passes through the access control and package installer
having it being efficient and this was the goal of the project thus it displays the menu where the user can select which scan, they
we have maximum customer satisfaction. The opinions should go forth with.
collected here helps in proceeding further into the system
development.
Each scan has its own division in which the user can use to
access each individual scan as per their needs. But before they
can proceed with a scan they are provided with an intermittent
screen where the user can type in the IP Address.
Authorized licensed use limited to: Universitas Airlangga. Downloaded on May 05,2024 at 11:12:02 UTC from IEEE Xplore. Restrictions apply.
6
Figure 17: Nmap Toolkit: Firewall, IDS, Evasion and Spoofing menu
Authorized licensed use limited to: Universitas Airlangga. Downloaded on May 05,2024 at 11:12:02 UTC from IEEE Xplore. Restrictions apply.
7
5 Conclusions
The reason to start this project was to make the entry into
cybersecurity easier for all the beginners out there as the
number of cybersecurity job is increasing day by day basis and
the tools being complex. It is overwhelming for students and
newbies alike to enter this field thus making a wide gap in the
industry. That is why Nmap toolkit was made as Nmap is the
tool that is first used in the initial stages of hacker methodology
which is known as Information gathering. It is the first tool that
is used to gather information on a particular network, or a range
of hosts and IPs. Without this tool it would be harder to gather
all the necessary information that is needed to proceed with
scanning and exploitation.
Figure 17: Nmap Toolkit: Nmap NetBIOS Scan Menu
Nmap toolkit was made to automate the complexity of the
Then log clearing option to clear the logs of each major scan Nmap into simple menu driven program which has all the
and its subsections can a well all together. functions of Nmap, to make it simple, to make sure that the core
functions of Nmap is usable and to provide the user flexibility
without studying the actual code or commands needed to work
through Nmap. This is done so to make it less overwhelming
for the beginners and to narrow the gap into entering the field
of cybersecurity easier without the hindrance of learning
complex codes and to have pre-requisite knowledge on
command line.
6 References
Authorized licensed use limited to: Universitas Airlangga. Downloaded on May 05,2024 at 11:12:02 UTC from IEEE Xplore. Restrictions apply.