Scripts that I made to implement the following network analysis capabilities to Malcolm, using its API:
- OS Fingerprint
- Services Scanner
- Hosts Last Seen
- Vulnerability Assessment
The script analyzes PCAP files and associates the most likely operating system using Satori software. The methods satori uses to perform OS fingerprint are documented here satori.
Scans for listening ports of each host that receive inbound traffic within the network.
The script pulls information from NetBox, builds the CPEs, and associates the relevant CVEs using the NIST API.
git clone https://github.com/xnih/satoriin the installation folder- Run Malcolm
- In Netbox create custom fields 'os' and 'last_seen' for each device.
- Edit the code with your parameters.
- Create cronjobs to run them regularly.