The OWASP Nettacker project was created to automate information gathering, scanning for vulnerabilities, and ultimately generating reports for the network, including services, errors, vulnerabilities, misconfigurations, and credentials. This software will use TCP SYN, ACK, ICMP, and many other protocols to discover and bypass Firewall / IDS / IPS devices. Use a uniform method in OWASP Nettacker to discover protected devices and services such as SCADA. This will be a competitive advantage over other scanners, making it one of the best.
Service and Device Detection ( SCADA, Restricted Areas, Routers, HTTP Servers, Logins and Authentications, None-Indexed HTTP, Paradox System, Cameras, Firewalls, UTM, WebMails, VPN, RDP, SSH, FTP, TELNET Services, Proxy Servers and Many Devices like Juniper, Cisco, Switches and many more… )
Asset Discovery & Network Service Analysis
Services Brute Force Testing
Services Vulnerability Testing
HTTP/HTTPS Crawling, Fuzzing, Information Gathering, and …
HTML, JSON, CSV and Text Outputs
API & WebUI
How to install and use the Nettacker tool?
Step 1: Install the Nettacker Tool
1. First of all, we need to install the Nettacker tool in our terminal, so run the following command.
git clone https://github.com/OWASP/Nettacker.git
2. Now change the directory to the Nettacker tool so type the below command in your terminal.
Step 2: Installing the requirement
Now type this below command in your Linux terminal this command will help you to install the requirements.
pip install -r requirements.txt
Step 3: Run the tool
After that run the nettacker.py python tool to get all information about a website.