mirror of https://github.com/avast/PurpleDome
You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
42 lines
1.0 KiB
Python
42 lines
1.0 KiB
Python
4 years ago
|
#!/usr/bin/env python3
|
||
|
|
||
|
# A plugin to nmap targets slow motion, to evade sensors
|
||
|
|
||
|
from plugins.base.kali import KaliPlugin
|
||
|
|
||
|
|
||
|
class NmapSneakyPlugin(KaliPlugin):
|
||
|
|
||
|
# Boilerplate
|
||
|
name = "nmap_sneaky"
|
||
|
description = "Nmap scan the target slowly. To sneak past detection"
|
||
|
ttp = "T1595"
|
||
|
references = ["https://attack.mitre.org/techniques/T1595/"]
|
||
|
|
||
|
required_files = [] # Files shipped with the plugin which are needed by the kali tool. Will be copied to the kali share
|
||
|
|
||
|
def __init__(self):
|
||
|
super().__init__()
|
||
|
self.plugin_path = __file__
|
||
|
|
||
|
def run(self, targets):
|
||
|
""" Run the command
|
||
|
|
||
|
@param targets: A list of targets, ip addresses will do
|
||
|
"""
|
||
|
|
||
|
res = ""
|
||
|
|
||
|
cmd = f"cd {self.get_playground()};"
|
||
|
for t in targets:
|
||
|
cmd += f"sudo nmap -T1 -F -D RND:5 -f --randomize-hosts {t};"
|
||
|
|
||
|
res += self.run_cmd(cmd) or ""
|
||
|
|
||
|
return res
|
||
|
|
||
|
def get_config_section_name(self):
|
||
|
""" Use nmap configuration """
|
||
|
|
||
|
return "nmap"
|