Open In App

CyberScan – Network’s Forensics ToolKit

Last Updated : 18 Mar, 2022
Improve
Improve
Like Article
Like
Save
Share
Report

CyberScan is an open-source penetration testing tool that can analyze packets, decoding, scanning ports, pinging, and geolocation of an IP including (latitude, longitude, region, country.) CyberScan tool is an automated tool developed in Python. CyberScan tool is fully automated and it is available on the Github platform for free. This tool is mostly used in the Network Scanning phase.

Note: Make Sure You have Python Installed on your System, as CyberScan is a python-based tool. Click to check the Installation process: Python Installation Steps on Linux

Installation of CyberScan Tool on Kali Linux OS

Step 1: In this step, we will be getting the CyberScan tool repository from Github.

git clone https://github.com/medbenali/CyberScan

Step 2: We have cloned the repository from Github, now we will navigate to the directory in which the python file is situated.

cd CyberScan

Step 3: Run the below command to verify the installation and check the help section of the tool.

./CyberScan.py -h

Working with CyberScan Tool on Kali Linux OS

Example 1: ARP Ping

sudo ./CyberScan.py -s 192.168.144.0/24 -p arp

In this example, we are pinging the target IP address range using ARP protocol.

Example 2: ICMP Ping

sudo ./CyberScan.py -s 192.168.144.128 -p icmp

In this example, we are pinging the target IP address range using ICMP protocol.

Example 3: TCP Ping

sudo ./CyberScan.py -s 192.168.144.128 -p tcp -d 80 

In this example, we are pinging the target IP address range using TCP protocol.

Example 4: UDP Ping

sudo ./CyberScan.py -s 192.168.144.128 -p udp

In this example, we are pinging the target IP address range using the UDP protocol.

Example 5: Port Scanner

sudo ./CyberScan.py -s 192.168.144.128 -p scan -d 1 -t 100

In this example, we are checking for open ports on the target IP address.

Example 6: Geolocalisation IP

sudo ./CyberScan.py -s 72.229.28.185 -p geoip

In this example, we are checking for the GeoIP location of the target IP address.

Example 7: Ethernet Headers

sudo ./CyberScan.py -f test.pcap -p eth

In this example, we are checking Ethernet Headers in the .pcap file, which consists of packet information.

Example 8: IP Headers

sudo ./CyberScan.py -f test.pcap -p ip

In this example, we are checking for IP addresses in the .pcap file.

Example 9: TCP Headers

sudo ./CyberScan.py -f test.pcap -p tcp

In this example, we are checking TCP Headers in the .pcap file.

Example 10: UDP Headers

sudo ./CyberScan.py -f test.pcap -p udp

In this example, we are checking UDP Headers in the .pcap file.

Example 11: ICMP Headers

sudo ./CyberScan.py -f test.pcap -p icmp

In this example, we are checking ICMP Headers in the .pcap file.



Like Article
Suggest improvement
Previous
Next
Share your thoughts in the comments

Similar Reads