ARP Scan tool NetScanTools

The ARP Scan Tool (AKA ARP Sweep or MAC Scanner) is a very fast ARP packet scanner that shows every active IPv4 device on your subnet. Since ARP is non-routable, this type of scanner only works on the local LAN (local subnet or network segment).

The ARP Scan Tool shows all active devices even if they have firewalls. Devices cannot hide from ARP packets like they can hide from Ping.

  • Send ARP packets to any number of destination hosts, using a configurable output bandwidth or packet rate.
    This is useful for system discovery, where you may need to scan large address spaces.
  • Construct the outgoing ARP packet in a flexible way.
    arp-scan gives control of all of the fields in the ARP packet and the fields in the Ethernet frame header.
  • Decode and display any returned packets.
    arp-scan will decode and display any received ARP packets and lookup the vendor using the MAC address.
  • Fingerprint IP hosts using the arp-fingerprint tool.

 

How to install arp-scan

To install arp-scan on Ubuntu or Debian:

# sudo apt-get install arp-scan

To install arp-scan on CentOS, Fedora or Redhat:

# sudo yum install arp-scan

To detect IP address with arp-scan, run the following.

# sudo arp-scan -I eth1 -l
Starting arp-scan 1.9.2 with 32 hosts (http://www.nta-monitor.com/tools-resources/security-tools/arp-scan/)
10.10.11.193 cc:4e:24:c7:71:14 test Communications Systems, Inc.
10.10.11.194 00:50:56:3e:57:25 VMware, Inc.
10.10.11.196 00:50:56:09:67:4e VMware, Inc.
10.10.11.197 00:50:56:w4:1d:fb VMware, Inc.
10.10.11.199 00:50:56:61:f8:f6 VMware, Inc.
10.10.11.202 00:50:56:a2:0d:09 VMware, Inc.
10.10.11.203 00:50:56:89:2n:a8 VMware, Inc.
10.10.11.204 00:50:56:89:27:77 VMware, Inc.
10.10.11.205 00:50:56:59:76:e7 VMware, Inc.
10.10.11.206 00:50:56:2e:3a:e3 VMware, Inc.
10.10.11.207 00:50:56:89:18:33 VMware, Inc.
10.10.11.208 00:50:56:2e:21:60 VMware, Inc.
10.10.11.209 00:50:56:1e:27:0a VMware, Inc.
10.10.11.210 00:50:56:89:24:46 VMware, Inc.
10.10.11.211 00:50:56:1e:3b:9a VMware, Inc.
10.10.11.212 00:50:56:89:3c:11 VMware, Inc.
10.10.11.216 00:50:56:2e:1e:da VMware, Inc.
10.10.11.218 00:50:56:3e:21:5c VMware, Inc.
10.10.11.220 00:0c:29:57:69:74 VMware, Inc.
10.10.11.222 00:50:56:8e:31:66 VMware, Inc.
10.10.11.213 00:50:56:89:45:00 VMware, Inc.
10.10.11.214 00:50:56:89:44:d8 VMware, Inc.
10.10.11.215 00:50:56:c4:1d:bb VMware, Inc.
10.10.11.217 00:50:56:89:3a:0f VMware, Inc.
10.10.11.219 00:50:56:49:12:db VMware, Inc.
10.10.11.221 00:50:56:89:8c:a6 VMware, Inc.

That’s it.

 

How to detect IP address conflicts

If you have any IP address conflict issue, you can see any two different MAC addresses are claiming the same IP address.

 

 

jnettop – Visualises network traffic monitoring tool

Jnettop is visualising active network traffic as the top does with processes. It displays active network streams sorted by bandwidth used. This is often usable when you want to get a fast grip on what is going on on your outbound router. Jnettop was done as a basic analysis tool and does not interpret most of the protocols on Internet. Namely, it can only interpret TCP/UDP/IP (v4 as well as v6 since 0.10) on EtherNet or Linux “any” device. This is one of the active visualises network traffic monitoring tool in Linux.

Features

  • list connections going across this host in a nice way
  • runs on almost any Unix flavor (see Porting)
  • supports IPv6
  • It supports customizable text output for further analysis
  • Jnettop supports machine-friendly mode to support further analysis
jnettop

visualises network traffic tool

 

jnettop installation

RPM Installation

Download the latest nux-dextop-release rpm from

http://li.nux.ro/download/nux/dextop/el7/x86_64/

Install nux-dextop-release rpm:

rpm -Uvh nux-dextop-release*rpm
yum install jnettop
jnettop -h
Usage: jnettop [-hv] [-i interface] [-d filename]

-h, –help display this help message
-v, –version display version information

-b, –bit-units show BPS in bits per second, not bytes per second
-c, –content-filter disable content filtering
-d, –debug filename write debug information into file (or syslog)
–display type type of display (curses, text, uia)
-f, –config-file name reads configuration from file. defaults to ~/.jnettop
–format format list of fields to list in text output
-i, –interface name capture packets on specified interface
–local-aggr arg set local aggregation to none/host/port
-n, –no-resolver disable resolving of addresses
-p, –promiscuous enable promisc mode on the devices
–remote-aggr arg set remote aggregation to none/host/port
-s, –select-rule rule selects one of the rules defined in config file
by it’s name
-t, –timeout sec timeout in seconds after which jnettop ends (text display)
-x, –filter rule allows for specification of custom filtering rule
this follows tcpdump(1) syntax. don’t forget to
enclose the filter into quotes when running from shell

 

Source Installation

Download source file from http://jnettop.kubs.info/wiki/?id=Download

If you just want jnettop to detect what’s available and compile, run:

gzip -dc jnettop-<version>.tar.gz | tar xf -
cd jnettop-<version>
./configure
make
make install

you’re done.

 

 

Lynis security audit tool for linux

Lynis is an open source and one of the most trusted automated auditing tool for software patch management, malware scanning and vulnerability detecting in Unix based systems. This tool is useful for auditors, network and system administrators, security specialists and penetration testers. This Lynis security audit tool for linux.

Lynis performs hundreds of individual tests, to determine the security state of the system. The security scan itself consists of performing a set of steps, from initializing the program, up to the displaying the report.

security audit tool

security audit tool

What Lynis is doing?

  • Determine operating system
  • Search for available tools and utilities
  • Check for Lynis update
  • Run tests from enabled plugins
  • Run security tests per category
  • Report status of security scan
  • During the scan, technical details about the scan are stored in a log file. At the same time findings (warnings, suggestions, data collection), are stored in a report file.

Download and Install

Download latest version from https://cisofy.com/download/lynis/

Login your server using root permission

[[email protected]]# wget https://cisofy.com/files/lynis-2.2.0.tar.gz
[[email protected]]# tar -zxvf lynis-2.2.0.tar.gz
[[email protected]]# cd lynis

[[email protected] lynis]# ./lynis audit system

[ Lynis 2.1.8 ]

################################################################################
comes with ABSOLUTELY NO WARRANTY. This is free software, and you are
welcome to redistribute it under the terms of the GNU General Public License.
See the LICENSE file for details about using this software.

Copyright 2007-2016 – CISOfy, https://cisofy.com
Enterprise support and plugins available via CISOfy
################################################################################

[+] Initializing program
————————————
– Detecting OS… [ DONE ]

—————————————————
Program version: 2.1.8
Operating system: Linux
Operating system name: CentOS
Operating system version: CentOS Linux release 7.1.1503 (Core)
Kernel version: 3.10.0
Hardware platform: x86_64
Hostname: testvm1
Auditor: [Unknown]
Profile: ./default.prf
Log file: /var/log/lynis.log
Report file: /var/log/lynis-report.dat
Report version: 1.0
Plugin directory: ./plugins
—————————————————
– Checking profile file (./default.prf)…
– Program update status… [ SKIPPED ]

[+] System Tools
————————————
– Scanning available tools…
– Checking system binaries…

[+] Plugins (phase 1)
————————————
Note: plugins have more extensive tests, which may take a few minutes to complete

– Plugin: pam
[.]

[+] Boot and services
————————————
– Service Manager [ systemd ]
– Checking UEFI boot [ DISABLED ]
– Checking presence GRUB [ OK ]
– Checking presence GRUB2 [ FOUND ]
– Checking for password protection [ WARNING ]
– Check running services (systemctl) [ DONE ]
Result: found 14 running services
– Check enabled services at boot (systemctl) [ DONE ]
Result: found 18 enabled services
– Check startup files (permissions) [ OK ]

[ Press [ENTER] to continue, or [CTRL]+C to stop ]
use help option for more information

[[email protected] lynis]# ./lynis –help

[ Lynis 2.2.0 ]

################################################################################
comes with ABSOLUTELY NO WARRANTY. This is free software, and you are
welcome to redistribute it under the terms of the GNU General Public License.
See the LICENSE file for details about using this software.

Copyright 2007-2016 – CISOfy, https://cisofy.com/lynis/
Enterprise support and plugins available via CISOfy
################################################################################

[+] Initializing program
————————————

Usage: lynis [options] mode
Mode:

audit
audit system : Perform security scan
audit dockerfile <file> : Analyze Dockerfile

update
update info : Show update details
update release : Update Lynis release
Scan options:
–auditor “<name>” : Auditor name
–dump-options : See all available options
–no-log : Don’t create a log file
–pentest : Non-privileged scan (useful for pentest)
–profile <profile> : Scan the system with the given profile file
–quick (-Q) : Quick mode, don’t wait for user input
–tests “<tests>” : Run only tests defined by <tests>
–tests-category “<category>” : Run only tests defined by <category>

Layout options:
–no-colors : Don’t use colors in output
–quiet (-q) : No output, except warnings
–reverse-colors : Optimize color display for light backgrounds

Misc options:
–debug : Debug logging to screen
–view-manpage (–man) : View man page
–version (-V) : Display version number and quit

Enterprise options:
–plugin-dir “<path>” : Define path of available plugins
–upload : Upload data to central node
More scan options are available. See man page and online documentation for details.