A simple command line ARP/TCP scanning tool.
_____ _____ _____ _ _ _____
/ ____| __ \_ _| \ | |/ ____|
| | __| |__) || | | \| | | __
| | |_ | ___/ | | | . ` | | |_ |
| |__| | | _| |_| |\ | |__| |
\_____|_| |_____|_| \_|\_____|
The ARP scan can be done on a single host or an entire subnet. The ARP scan will return the IP, MAC, and perform an OUI lookup of the host to determine the type of device. These results can be output to a file of your choosing This tool is in its early stages.
The TCP scan will scan a single host for designated ports, or if no ports are given then the tool will scan ports 1-1024. The results are returned with TCP flag. This tool will only send an initial SYN flag and will look for a SYN ACK in return. Known ports will be displayed as their protocal. i.e. 22 - ssh, 443 - https
Download the gping.py
script and
use the package manager pip to install dependencies.
pip install -r requirements.txt
or
pip install logging
pip install scapy
pip install argparse
pip install ouilookup
pip install random
pip install datetime
To use the tool, cd to the directory that contains your gping.py
script and then run the script as shown below:
python gping.py <args>
or use the following for help:
python gping.py --help
_____ _____ _____ _ _ _____
/ ____| __ \_ _| \ | |/ ____|
| | __| |__) || | | \| | | __
| | |_ | ___/ | | | . ` | | |_ |
| |__| | | _| |_| |\ | |__| |
\_____|_| |_____|_| \_|\_____|
usage: gping.py [-h] [-a ARP] [-t TCP] [-p [PORT ...]] [-o OUTPUT]
A simple command line ARP/TCP scanning tool. Use -a to perform an ARP scan on
a given subnet. Use -t to perform a TCP SYN scan, if no port are selected then
port 1-1024 will be scanned. Use -p to specify port. Please see the arguments
for examples.
optional arguments:
-h, --help show this help message and exit
-a ARP, --arp ARP perform an arp-scan on the provided subnet or IP which
will return MAC, IP, and OUI lookup. ex: gping.py -a
10.0.0.1 or gping.py -a 10.0.0.0/24
-t TCP, --tcp TCP perform a tcp-scan on the provided subnet. ex:
gping.py -t 10.0.0.1
-p [PORT ...], --port [PORT ...]
specify port to be scanned (80 443 22...). ex:
gping.py -t 10.0.0.1 -p 443
-o OUTPUT, --output OUTPUT
output results to a file of your choice
This tool will be continue to be updated, if you would like a feature please put in an issue and I will address it when available. Upcoming:
- UDP Scan
- XMAS Scan
- Scan formating
- Exfil via packet padding
If you would like to become a contributer please open an issue. For changes, please open an issue first to discuss what you would like to change.
If a you would like to commit a change, please open a pull request for review. Please make sure to update tests as appropriate.
MIT License