Skip to content

Commit b465808

Browse files
authored
Readme update with updated text, docker commands +docker-compose update (#1121)
* Update README.md Readme update with the updated tool description text and revised Docker run commands in Quick Start * Update docker-compose.yml fix he command as the new runtime Docker no longer has poetry and runs Nettacker directly
1 parent 5183217 commit b465808

File tree

2 files changed

+72
-27
lines changed

2 files changed

+72
-27
lines changed

README.md

Lines changed: 71 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -18,37 +18,90 @@ OWASP Nettacker
1818

1919
![2018-01-19_0-45-07](https://user-images.githubusercontent.com/7676267/35123376-283d5a3e-fcb7-11e7-9b1c-92b78ed4fecc.gif)
2020

21-
OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software **will** utilize TCP SYN, ACK, ICMP, and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanners making it one of the best.
21+
OWASP Nettacker is an open-source, Python-based automated penetration testing and information-gathering framework designed to help cyber security professionals and ethical hackers perform reconnaissance, vulnerability assessments, and network security audits efficiently. Nettacker automates tasks like port scanning, service detection, subdomain enumeration, network mapping, vulnerability scanning, credential brute-force testing making it a powerful tool for identifying weaknesses in networks, web applications, IoT devices and APIs.
2222

23+
### Key Features
2324

24-
* OWASP Page: https://owasp.org/www-project-nettacker/
25-
* Wiki: https://github.com/OWASP/Nettacker/wiki
26-
* Slack: #project-nettacker on https://owasp.slack.com
27-
* Installation: https://github.com/OWASP/Nettacker/wiki/Installation
28-
* Usage: https://github.com/OWASP/Nettacker/wiki/Usage
29-
* GitHub: https://github.com/OWASP/Nettacker
25+
- **Modular architecture** - Each task — like port scanning, directory discovery, subdomain enumeration, vulnerability checks, or credential brute-forcing - is implemented as its own module, giving you control over what runs.
26+
- **Multi-protocol & multithreaded scanning** - Supports HTTP/HTTPS, FTP, SSH, SMB, SMTP, ICMP, TELNET, XML-RPC, and can run scans in parallel for speed.
27+
- **Comprehensive output** - Export reports in HTML, JSON, CSV, and plain text.
28+
- **Built-in database & drift detection** - Stores past scans in the database for easy search and comparison with current results: useful to detect new hosts, open ports, or vulnerabilities in CI/CD pipelines.
29+
- **CLI, REST API & Web UI** - Offers both programmatic integration and a user-friendly web interface for defining scans and viewing results.
30+
- **Evasion techniques** - Enables configurable delays, proxy support, and randomized user-agents to reduce detection by firewalls or IDS systems.
31+
- **Flexible targets** - Accepts single IPv4s, IP ranges, CIDR blocks, domain names, and full HTTP/HTTPS URLs. Targets can be mixed in a single command or loaded from a file using the `-l/--targets-list` flag.
32+
33+
### Use Cases
34+
35+
- **Penetration Testing**
36+
Automate reconnaissance, misconfiguration checks, service discovery, and vulnerability scanning to support efficient and repeatable penetration testing workflows.
37+
38+
- **Recon & Vulnerability Assessment**
39+
Map live hosts, open ports, services, default credentials, and directories, then perform credential brute-forcing or fuzzing using built-in or custom wordlists.
40+
41+
- **Attack Surface Mapping**
42+
Discover exposed hosts, ports, subdomains, and services quickly using built-in enumeration modules—ideal for both internal and external assets.
43+
44+
- **Bug Bounty Recon**
45+
Automate and scale common reconnaissance tasks like subdomain enumeration, directory brute-forcing, and default credential checks to speed up finding targets.
46+
47+
- **Network Vulnerability Scanning**
48+
Efficiently scan IPs, IP ranges, or entire CIDR blocks or all subdmains of the organisation in parallel using a modular, multithreaded approach for large-scale network assessments.
49+
50+
- **Shadow IT & Asset Discovery**
51+
Use historical scan data and drift detection to uncover unmanaged or forgotten hosts, open ports/services, and subdomains appearing over time.
52+
53+
- **CI/CD & Compliance Monitoring**
54+
Integrate Nettacker into pipelines to track infrastructure changes and detect new vulnerabilities via stored scan history and comparison features.
55+
56+
### Links
57+
58+
* OWASP Nettacker Project Home Page: https://owasp.org/nettacker
59+
* Documentation: https://nettacker.readthedocs.io
60+
* Slack: [#project-nettacker](https://owasp.slack.com/archives/CQZGG24FQ) on https://owasp.slack.com
61+
* Installation: https://nettacker.readthedocs.io/en/latest/Installation
62+
* Usage: https://nettacker.readthedocs.io/en/latest/Usage
63+
* GitHub repo: https://github.com/OWASP/Nettacker
3064
* Docker Image: https://hub.docker.com/r/owasp/nettacker
31-
* How to use the Dockerfile: https://github.com/OWASP/Nettacker/wiki/Installation#docker
65+
* How to use the Dockerfile: https://nettacker.readthedocs.io/en/latest/Installation/#install-nettacker-using-docker
3266
* OpenHub: https://www.openhub.net/p/OWASP-Nettacker
3367
* **Donate**: https://owasp.org/donate/?reponame=www-project-nettacker&title=OWASP+Nettacker
3468
* **Read More**: https://www.secologist.com/open-source-projects
3569

3670
____________
3771
Quick Setup & Run
3872
============
73+
### CLI (Docker)
3974
```bash
40-
$ docker-compose up -d && docker exec -it nettacker-nettacker-1 /bin/bash
41-
# poetry run python nettacker.py -i owasp.org -s -m port_scan
75+
76+
# Basic port scan on a single IP address:
77+
$ docker run owasp/nettacker -i 192.168.0.1 -m port_scan
78+
# Scan the entire Class C network for any devices with port 22 open:
79+
$ docker run owasp/nettacker -i 192.168.0.0/24 -m port_scan -g 22
80+
# Scan all subdomains of 'owasp.org' for http/https services and return HTTP status code
81+
$ docker run owasp/nettacker -i owasp.org -d -s -m http_status_scan
82+
# Display Help
83+
$ docker run owasp/nettacker --help
84+
85+
86+
```
87+
### Web UI (Docker)
88+
89+
```bash
90+
$ docker-compose up
4291
```
43-
* Results are accessible from your (https://localhost:5000) or https://nettacker-api.z3r0d4y.com:5000/ (pointed to your localhost)
92+
* Use the API Key displayed in the CLI to login to the Web GUI
93+
* Web GUI is accessible from your (https://localhost:5000) or https://nettacker-api.z3r0d4y.com:5000/ (pointed to your localhost)
4494
* The local database is `.nettacker/data/nettacker.db` (sqlite).
4595
* Default results path is `.nettacker/data/results`
4696
* `docker-compose` will share your nettacker folder, so you will not lose any data after `docker-compose down`
47-
* To see the API key in you can run `docker logs nettacker_nettacker_1`.
48-
* More details and setup without docker https://github.com/OWASP/Nettacker/wiki/Installation
97+
* To see the API key in you can also run `docker logs nettacker_nettacker`.
98+
* More details and install without docker https://nettacker.readthedocs.io/en/latest/Installation
4999
_____________
50-
Thanks to our awesome contributors
100+
Thanks to our awesome contributors!
51101
============
102+
103+
OWASP Nettacker is an open-source project, built on the principles of collaboration and shared knowledge. The vibrant OWASP community contributes to its development, ensuring that the tool remains up-to-date, adaptable, and aligned with the latest security practices. Thanks to all our awesome contributors! 🚀
104+
52105
![Awesome Contributors](https://contrib.rocks/image?repo=OWASP/Nettacker)
53106

54107
## Adopters
@@ -61,20 +114,12 @@ If you’re using OWASP Nettacker in your organization or project, we’d love t
61114

62115
_____________
63116

64-
## ***IoT Scanner***
65-
* Python Multi Thread & Multi Process Network Information Gathering Vulnerability Scanner
66-
* Service and Device Detection ( SCADA, Restricted Areas, Routers, HTTP Servers, Logins and Authentications, None-Indexed HTTP, Paradox System, Cameras, Firewalls, UTM, WebMails, VPN, RDP, SSH, FTP, TELNET Services, Proxy Servers and Many Devices like Juniper, Cisco, Switches and many more… )
67-
* Asset Discovery & Network Service Analysis
68-
* Services Brute Force Testing
69-
* Services Vulnerability Testing
70-
* HTTP/HTTPS Crawling, Fuzzing, Information Gathering and …
71-
* HTML, JSON, CSV and Text Outputs
72-
* API & WebUI
73-
* This project is at the moment in research and development phase
74-
* Thanks to Google Summer of Code Initiative and all the students who contributed to this project during their summer breaks:
117+
## ***Google Summer of Code (GSoC) Project***
118+
* ☀️ OWASP Nettacker Project is participating in the Google Summer of Code Initiative
119+
* 🙏 Thanks to Google Summer of Code Initiative and all the students who contributed to this project during their summer breaks:
75120

76121

77-
<img src="https://betanews.com/wp-content/uploads/2016/03/vertical-GSoC-logo.jpg" width="200"></img>
122+
<a href="https://summerofcode.withgoogle.com"><img src="https://betanews.com/wp-content/uploads/2016/03/vertical-GSoC-logo.jpg" width="200"></img></a>
78123

79124
_____________
80125
## Stargazers over time

docker-compose.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ services:
33
build:
44
context: .
55
dockerfile: Dockerfile
6-
command: poetry run python ./nettacker.py --start-api --api-host 0.0.0.0
6+
command: --start-api --api-host 0.0.0.0
77
container_name: nettacker
88
environment:
99
- docker_env=true

0 commit comments

Comments
 (0)