Your Perfect Cybersecurity Partner

Stay Connected:

OFFPORT KILLER

Image

 

The tool aims at automating the identification of potential services running behind ports identified manually either through manual scan or services running locally.

Features

Alternative for network scanning tools like nmap.

Installation

Demo

 

Usage

./OFFPORT_KILLER.sh -i inputfile.txt -r report.txt -e /tmp/

Options

  • -i : input file (format IP:PORT)
  • -r : report name (save the output)
  • -h : help

Steps

Step 1: Perform a manual port scanning (using nc, tcpdump or whatever) or identify services running locally.

Step 2: Create a file with format IP:PORT (where IP is the target IP address and PORT is a port identified).

Step 3: Run the tool with the file created using the argument -i.