Name Modified Size InfoDownloads / Week
Parent folder
README.txt 2014-01-26 3.3 kB
gpl.txt 2014-01-15 35.1 kB
banner_grab.py 2014-01-13 17.8 kB
Totals: 3 Items   56.2 kB 0
Python Security Toolkit
Banner Grabber
http://pythonsecuritytoolkit.sourceforge.net/

This program is written in Python 3.  Please run it in a Python 3 interpreter.

Python Security Toolkit is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
Python Security Toolkit is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
GNU General Public License for more details.

You should have received a copy of the GNU General Public License
along with this program.  If not, see <http://www.gnu.org/licenses/>.





Instructions
---------------------------------------------------------------------------------------------------

Usage:
This program is written in Python 3 and must be ran in a Python 3 interpreter.
Execute the program from a command line console with the Python 3 interpreter.
Example:  command_prompt>python banner_grab.py





Positional arguments:

The banner grabber has 1 required positional argument

The positional argument is host.  This is the host that you wish to scan.
Example:  command_prompt>python banner_grab.py host_to_scan.com





Optional arguments:

The banner grabber has 5 optional arguments.

-h, or --help
        This argument displays a help file giving a brief explanation about the
        file's command line arguments.
        Example:  command_prompt>python banner_grab.py -h

-l or --list
        This argument allows the user to input a list of ports to be scanned.
        Enter a comma delimited list of ports to be scanned after the flag.
        Example:  command_prompt>python banner_grab.py host_to_scan.com -l 21, 22, 23, 24, 80, 85

-r or --range
        This argument allows the user to input a range of ports to be scanned. This range is inclusive.
        Enter a comma delimited list or ports after the flag.
        Enter the lower limit range port first, then the upper limit range port second.
        Example:  command_prompt>python banner_grab.py host_to_scan.com -r 21, 85

-p or --protocol
        This argument allows the user to designate if they want to scan using TCP, UDP, or both.
        Example:  command_prompt>python banner_grab.py host_to_scan.com -p t    (For TCP scans)
        Example:  command_prompt>python banner_grab.py host_to_scan.com -p u    (For UDP scans)
        Example:  command_prompt>python banner_grab.py host_to_scan.com -p tu   (For both TCP and UDP scans)

-w or --write
        This argument allows the user to write the output of the scan to a file.
        Enter the name of the file you wish to write the output to after the flag.
        Example:  command_prompt>python banner_grab.py host_to_scan.com -w output_file.txt





Defaults:

If no argument is given for ports to scanned, a default range of 1 to 1024 inclusive, will be scanned.
If no argument is given for which protocol to use for the scan, then TCP only will be used.
If no argument is given to write output to a file, then output of the scan will only be printed to the console.
Source: README.txt, updated 2014-01-26