Penetration Testing mailing list archives
Re: new tool: qahs
From: Oliver Karow <Oliver.karow () gmx de>
Date: Fri, 06 Jun 2003 12:20:10 +0200
methodic () libpcap net schrieb:
Hi, for Port 6000 you can use xscan, which looks for open xhosts and captures keystrokes.Im working on a tool called qahs (quick automatied host scanner).. basically it will nmap a host, parse it's open ports, attempts to get banners from open services, and has internal rules, so if port 79 is open, it'll run finger, if 2049 is open, it will run showmount, etc.. it's a great tool to use if you're pen-testing subnets. qahs will write a seperate log file for each host scanned, so you can grep through them, or do something like less *.log. this isn't a "release" yet.. Id like to make it as complete as I can before I officially release it to other places. if you have any good ideas or know of any good programs to run if a port is open (im looking for a good one for port 6000), please feel free to email me. you can wget qahs here: http://libpcap.net/qahs.tar.gz thanks.
Please hava a look at probe, which is a little bit older, but might do the same as qahs!
http://www.thc.org/download.php?t=r&d=probe-4.1.tar.gz bye, Oliver Karow. --------------------------------------------------------------------------- ----------------------------------------------------------------------------
Current thread:
- new tool: qahs methodic (Jun 04)
- Re: new tool: qahs Oliver Karow (Jun 06)
- <Possible follow-ups>
- RE: new tool: qahs Dawes, Rogan (ZA - Johannesburg) (Jun 06)