The tool aims at automating the identification of potential services running behind ports identified manually either through manual scan or services running locally.
Alternative for network scanning tools like nmap.
- git clone https://github.com/TH3xACE/OFFPORT_KILLER.git
- cd OFFPORT_KILLER
./OFFPORT_KILLER.sh -i inputfile.txt -r report.txt -e /tmp/
- -i : input file (format IP:PORT)
- -r : report name (save the output)
- -h : help
Step 1: Perform a manual port scanning (using nc, tcpdump or whatever) or identify services running locally.
Step 2: Create a file with format IP:PORT (where IP is the target IP address and PORT is a port identified).
Step 3: Run the tool with the file created using the argument -i.