NetworkScan Documentation#
NetworkScan is a comprehensive network scanning and penetration testing tool that provides capabilities for discovering network resources, enumerating services, and performing security assessments.
Available Commands#
Discover#
Network discovery capabilities to identify live hosts, open ports, running services, and TLS configurations.
Subcommands:
- host
- Identify live hosts within IP ranges using various discovery techniques
- os
- Detect and fingerprint operating systems (requires nmap and root privileges)
- port
- Scan for open TCP ports with customizable scan types and port ranges
- service
- Identify and fingerprint network services on specific ports
- tls
- Retrieve and analyze TLS configuration and certificate details
- domain
- Discover domain information using LDAP/SMB discovery and DNS enumeration
Enumerate#
Detailed enumeration of supported network services on target hosts.
Subcommands:
- service
- Enumerate detailed information about supported network services (ftp, grpc, ldap, smb, smtp, ssh)
Pentest#
Comprehensive penetration testing capabilities including credential spraying and service-specific attacks.
Spray Commands:
- spray password
- Password spraying attacks against network services (SSH, SMB, TELNET, FTP, LDAP, KERBEROS)
- spray username
- Username enumeration against network services (KERBEROS)
Service Commands:
- service smb
- SMB penetration testing with authentication, command execution, share enumeration, and file downloads
- service ssh
- SSH penetration testing with authentication, command execution, and file transfers
- service telnet
- Telnet penetration testing with authentication and command execution
- service ldap
- LDAP penetration testing with authentication and domain enumeration
- service msrpc
- MS-RPC penetration testing including DCSync attacks via DRSUAPI
- service kerberos
- Kerberos penetration testing with advanced attacks such as constrained delegation
Global Flags#
All commands support the following global flags:
-o, --output string
- Output format (signal, json, yaml). Default value is signal (default "signal")-f, --output-file string
- Path to output file. If blank, will output to STDOUT-q, --quiet
- Suppress output-v, --verbose
- Verbose output
Getting Help#
For help with any command, use the -h
or --help
flag:
networkscan -h
networkscan discover -h
networkscan enumerate service -h
networkscan pentest smb -h