CyberScan – Network’s Forensics ToolKit
CyberScan is an open-source penetration testing tool that can analyze packets, decoding, scanning ports, pinging, and geolocation of an IP including (latitude, longitude, region, country.) CyberScan tool is an automated tool developed in Python. CyberScan tool is fully automated and it is available on the Github platform for free. This tool is mostly used in the Network Scanning phase.
Note: Make Sure You have Python Installed on your System, as CyberScan is a python-based tool. Click to check the Installation process: Python Installation Steps on Linux
Installation of CyberScan Tool on Kali Linux OS
Step 1: In this step, we will be getting the CyberScan tool repository from Github.
git clone https://github.com/medbenali/CyberScan
Step 2: We have cloned the repository from Github, now we will navigate to the directory in which the python file is situated.
cd CyberScan
Step 3: Run the below command to verify the installation and check the help section of the tool.
./CyberScan.py -h
Working with CyberScan Tool on Kali Linux OS
Example 1: ARP Ping
sudo ./CyberScan.py -s 192.168.144.0/24 -p arp
In this example, we are pinging the target IP address range using ARP protocol.
Example 2: ICMP Ping
sudo ./CyberScan.py -s 192.168.144.128 -p icmp
In this example, we are pinging the target IP address range using ICMP protocol.
Example 3: TCP Ping
sudo ./CyberScan.py -s 192.168.144.128 -p tcp -d 80
In this example, we are pinging the target IP address range using TCP protocol.
Example 4: UDP Ping
sudo ./CyberScan.py -s 192.168.144.128 -p udp
In this example, we are pinging the target IP address range using the UDP protocol.
Example 5: Port Scanner
sudo ./CyberScan.py -s 192.168.144.128 -p scan -d 1 -t 100
In this example, we are checking for open ports on the target IP address.
Example 6: Geolocalisation IP
sudo ./CyberScan.py -s 72.229.28.185 -p geoip
In this example, we are checking for the GeoIP location of the target IP address.
Example 7: Ethernet Headers
sudo ./CyberScan.py -f test.pcap -p eth
In this example, we are checking Ethernet Headers in the .pcap file, which consists of packet information.
Example 8: IP Headers
sudo ./CyberScan.py -f test.pcap -p ip
In this example, we are checking for IP addresses in the .pcap file.
Example 9: TCP Headers
sudo ./CyberScan.py -f test.pcap -p tcp
In this example, we are checking TCP Headers in the .pcap file.
Example 10: UDP Headers
sudo ./CyberScan.py -f test.pcap -p udp
In this example, we are checking UDP Headers in the .pcap file.
Example 11: ICMP Headers
sudo ./CyberScan.py -f test.pcap -p icmp
In this example, we are checking ICMP Headers in the .pcap file.
Contact Us