Faster your NMAP scan with “Agile Grabber”

Make your scan faster in CTFs to save time on scanning.

Jay Vadhaiya
InfoSec Write-ups

--

Greetings of the day everyone. In today’s article we are going to go through one of my tools called “Agile Grabber”. Agile Grabber is multi cored and multi threaded tool made with python and nmap to faster the scan results. You can get the tool from below link to go through the tool along with the article.

Before you start, You can join our discord server to engage with like minded people and share everything that you can share with people to help them and get your queries answered by people.

Timing is a very important aspect of CTF challenges. The more time you save, more you can explore ahead. While targeting a machine, you should have such thing that can save your time and give you the results faster to speed up the process. For that purpose I have developed one tool called “Agile Grabber” to satisfy the need. You can clone or download the tool from given repository.

“Agile Grabber” is made with python that utilizes the multiprocessing and multithreading capabilities of python to make scan faster than usual. We are going to compare same target with this tool and nmap to see the results.

Installation

git clone https://github.com/sudo0x18/AgileGrabber.git
cd AgileGrabber

Requirement Installation

pip3 install -r requirements.txt

Usage

python3 agile_grabber.py -t TARGET -th THREADS

Demo

**NOTE** : Use AgileGrabber with your host machine instead of virtual machine to optimize the speed of the CPU in the best manner. This tool supports Windows and Mac operating system.

Agile Grabber Scan

We are going to scan http://scanme.nmap.org for demo purpose.

Here we are giving target with flag -t as scanme.nmap.org and the number of threads with flag -th as 250. You can give more than that also. The number of threads depends upon your CPU capabilities. It scans for 65,535 ports by default.

As you can see that it completed scanning all 65,535 ports in only 1 minute and 32 seconds. Incredibly fast nah. Now it will take all open ports and start nmap scan on all of them to get more results and clarity. Now this time it will create multiple processes to faster the scan results.

As you can see that it completed the advanced scan in only 16 seconds and completed full scan in only 1 minute and 54 seconds. Very fast, right?It is the power of python and multiprocessing and multithreading. Now let’s see the same example with nmap with the same number of ports and same type of options.

NMAP Scan

Put the nmap scan the above command to scan the target and wait for the results.

As you can see it took 18 minutes and 63 seconds to do the same scan as above. But timings of the both scans are far away from each other’s scan timing. That’s all.

If you like this tool then give a star and share with your friends. And if you wanted to test my another tool then read below article on my other tool.

This is it for today’s article. If you found it interesting and informative then share it with your friends. Thank you for reading till here. Let me know your query or topic on which you wanted to read an article in the response section. Follow me and subscribe to get juicy articles in your email directly.

You can follow social media here: LinkedIn, Instagram, Twitter

From Infosec Writeups: A lot is coming up in the Infosec every day that it’s hard to keep up with. Join our weekly newsletter to get all the latest Infosec trends in the form of 5 articles, 4 Threads, 3 videos, 2 GitHub Repos and tools, and 1 job alert for FREE!

--

--