Skip to content

A script geared towards automating the scanning of an Active Directory environment with Nmap. Can be adjusted to fit other cases.

Notifications You must be signed in to change notification settings

arth0sz/AD-network-scanning-script

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

Bash script for AD network scanning with Nmap

This is a script I put together to deal with scanning an Active Directory environment with Nmap after going through the Active Directory Enumeration & Attacks module on HackTheBox.

It takes a network range in CIDR notation as the only command-line argument and goes looking for port 88 and 445 to find active hosts. Then it scans them for the 1000 common ports and performs a more detailed script and version scan on all open ports.

The results are saved for each IP in the three major formats for Nmap along with being output to the terminal.

You can uncomment the portion indicated in the script in case you don't want all the output crowding your terminal.

You can also adjust the ports it looks for to fit other environments.

The script is also made with a proxy in mind. For my testing, I was pivoting with ligolo-ng.

Usage:

./network-scanning.sh 172.16.7.0/24

If you don't enter the appropriate argument, you'll receive the corresponding error messages.

Output:

For a cleaner output like this, uncomment the portion of line 72 indicated in the script.

By default, you'll see the results of the scan in your terminal:

Output files:

The results of the scan will be saved in the directory from which the script was ran like this:

About

A script geared towards automating the scanning of an Active Directory environment with Nmap. Can be adjusted to fit other cases.

Resources

Stars

Watchers

Forks

Languages