Tech ChroniclesRamblings of a Tech Dude
Astsu: Network Scanning Tool

Astsu: Network Scanning Tool

Astsu is a network scanning tool which can be used to perform basic network reconnaissance tasks. It has been developed in Python 3 using the Scapy packet manipulation tool.

Astsu: Network Scanning Tool

Astsu performs three major tasks. The first function is the ability to scan common ports and check whether they are open or not. If a port is open, the tool will then use nmap to check the service being run on the port. The second ability of Astsu is to discover hosts operating on the network. It does this by using the routers IP to map all possible IP’s and then send packets to each IP and wait for a response. The last objective which Astsu achieves is the ability to determine the Operating System of a host on a network. It does this by analyzing a packet received from the target for the OS details.

A great option of this tool is that the user can choose the network protocol to use in the scan. In addition to this, the user can also define how long the tool should wait before it timeouts.

Features:

  • Perform basic network reconnaissance with this tool
  • Scan the ports of a target IP address and check which ports are open or closed and what services are running on them
  • Discover the hosts in a network
  • Scan a host for the Operating System
  • Can be used in the reconnaissance phase of a penetration test
  • Option to use a stealth scan method to hide the user’s identity
  • Option to scan a range of ports or scan all the ports

How it works

  • Scan common ports

Send a TCP Syn packet to the destination on the defined port, if the port is open, use an nmap scan to check the service running on the port and prints all the ports found.

  • Discover hosts in network

Uses as a base the router’s ip to map all possible ips. It then sends an ICMP packet to each IP, and waits for a response, if it receives any response saved in an array the IP of the online host, and when it finishes checking all hosts, prints all hosts online.

  • OS Scan

Sends an ICMP packet to the destination and waits for a response. Then, extracts the TTL from the destination response and checks the possible OS in a list, if have founded, prints it.

OS Support

  • Windows ✔️
  • Linux ✔️
  • Mac

How to install

Clone this repository git clone https://github.com/ReddyyZ/astsu.git

  • Install python 3.
    • Linux
      • apt-get install python3
      • chmod +x *
      • python3 -m pip install -r requirements.txt
      • python3 install.py
      • Done!
    • Windows

Arguments

  • -sC | Scan common ports
    • -p | Protocol to use in the scan
    • -i | Interface to use
    • -t | Timeout to each request
    • -st | Use stealth scan method (TCP)
  • -sA | Scan all ports
    • -p | Protocol to use in the scan
    • -i | Interface to use
    • -t | Timeout to each request
    • -st | Use stealth scan method (TCP)
  • -sP | Scan a range ports
    • -p | Protocol to use in the scan
    • -i | Interface to use
    • -t | Timeout to each request
    • -st | Use stealth scan method (TCP)
  • -sO | Scan OS of a target
  • -d | Discover hosts in the network
    • -p | Protocol to use in the scan
    • -i | Interface to use

Examples

  • Discover hosts
astsu -d
  • Scan common ports using SYN Scan
astsu -sC -st 192.168.1.1
  • Scan a range of ports
astsu 192.168.1.1 -sP 1 443
  • Scan OS
astsu -sO 192.168.1.1

License

This project is under the MIT License.

Share:FacebookX
Join the discussion
Tech Chronicles
RSS
Follow by Email
LinkedIn
Share