Kali Linux Tutorials - Sandmap - Nmap Automation Tool - Kali Linux Command
What is Sandmap ?
- Sandmap is a security tool supporting network & system reconnaissance using Nmap (network discovery and security auditing).
- It is User-friendly-interface and speed up scanning.
- It is used to allow many advanced scanning techniques.
- There are some features available, which includes predefined scans, multiple scans and to support Nmap Scripting Engine.

Learn Ethical Hacking - Ethical Hacking tutorial - Sandmap - Ethical Hacking examples - Ethical Hacking programs
Alternatives of Sandmap :
Recon-ng
- Recon-ng is a full-featured web reconnaissance frame work. It was developed by Tim Tomes.
- It is written in Python. This tool is focused on web-based open-source reconnaissance. It is modular framework and easy to access by new python developers.
- It is used for penetration testing and security assessments. It is similar to Metasploit framework.

Learn Ethical Hacking - Ethical Hacking tutorial - Recon-ng - Ethical Hacking examples - Ethical Hacking programs
0TRACE.PY
- 0TRACE.PY is hop enumeration & security tool , which is developed by Michal zalewaki. It is a python port.
- It performs reconnaissance and hop enumeration (similar to traceroute).
- It uses established TCP connection.
- It is used to gather information about network.

Learn Ethical Hacking - Ethical Hacking tutorial - 0TRACE.PY - Ethical Hacking examples - Ethical Hacking programs
Detectem
- Detectem is a vulnerability detection system, which is used for get software information. It has features of Command line interface and JSON output supported.
- It is written in python and it is very much helpful in penetration testing.
- It is used for the purposes: Application testing , Vulnerability scanning.

Learn Ethical Hacking - Ethical Hacking tutorial - Detectem - Ethical Hacking examples - Ethical Hacking programs
Gitem
- Gitem is a reconnaissance tool, which is used to extract information and it is written in python
- It is developed by Matt Schwager.
- It is used to find the leaking of sensitive data, security assessment, security monitoring.

Learn Ethical Hacking - Ethical Hacking tutorial - Gitem - Ethical Hacking examples - Ethical Hacking programs
Step by Step Procedure :
Step 1:
- Open Terminal in Kali Linux

Learn Ethical Hacking - Ethical Hacking tutorial - Open Terminal - Ethical Hacking examples - Ethical Hacking programs
Step 2:
- Type sandmap command to open sandmap tool.

Learn Ethical Hacking - Ethical Hacking tutorial - Type Sandmap - Ethical Hacking examples - Ethical Hacking programs
- The sandmap page will be loading.

Learn Ethical Hacking - Ethical Hacking tutorial - Loading Modules - Ethical Hacking examples - Ethical Hacking programs
Read Also
Step 3:
- The sandmap interface is displayed which is to automate, speed up scanning & allow to use advanced scanning. Type help command to view the help commands.

Learn Ethical Hacking - Ethical Hacking tutorial - Type help - Ethical Hacking examples - Ethical Hacking programs
- Help commands are Displayed. They are mentioned below:
- help - Show cli
help
or modulehelp
- list - Show available modules
- config - Show global or module configuration
- set -
set
global or module variable value - use - Use module
- pushd - Command line commands stack
- search - Search key in all commands
- reload - Reload all modules cache or configuration
- banner - Show banner
- help - Show cli

Learn Ethical Hacking - Ethical Hacking tutorial - Help commands displayed - Ethical Hacking examples - Ethical Hacking programs
Step 4:
- Type list command to view all modules.

Learn Ethical Hacking - Ethical Hacking tutorial - Type list to view modules - Ethical Hacking examples - Ethical Hacking programs
- Select
host_discovery
option for discovering host details.

Learn Ethical Hacking - Ethical Hacking tutorial - Select Host Discovery - Ethical Hacking examples - Ethical Hacking programs
Step 5:
- Type use host_discovery command for discovering particular host details.

Learn Ethical Hacking - Ethical Hacking tutorial - Use host discovery - Ethical Hacking examples - Ethical Hacking programs
Step 6:
- Type set dest www.wikitechy.com command for setting destination (for your target)

Learn Ethical Hacking - Ethical Hacking tutorial - Set target - Ethical Hacking examples - Ethical Hacking programs
- Type show command for alias, which means attacking commands.

Learn Ethical Hacking - Ethical Hacking tutorial - Type show to view attacking commands - Ethical Hacking examples - Ethical Hacking programs
- The attacking commands are displayed. They are the following terms:
- list_scan
- ping_scan
- no_port_scan
- tcp_syn_ping
- udp_ping
- tcp_ack_ping
- sctp_init_ping
- arp_ping
- icmp_ping-1
- icmp_ping-2
- icmp_ping-3

Learn Ethical Hacking - Ethical Hacking tutorial - Ping command - Ethical Hacking examples - Ethical Hacking programs
Step 7:
- Type init 0 command to initiate the list_scan command's ID number.

Learn Ethical Hacking - Ethical Hacking tutorial - List scan - Ethical Hacking examples - Ethical Hacking programs
- The output is displayed and also Nmap command appeared as nmap -sL www.wikitechy.com

Learn Ethical Hacking - Ethical Hacking tutorial - Nmap command - Ethical Hacking examples - Ethical Hacking programs
Step 8:
- Type init 8 command for arp_ping ( Address resolution protocol ping which is used to discover link layer address ) and the result is displayed.

Learn Ethical Hacking - Ethical Hacking tutorial - Ping command - Ethical Hacking examples - Ethical Hacking programs
Step 9:
- Type init 8 command ( ihttp-config-backup ) which is to get some cookies values.

Learn Ethical Hacking - Ethical Hacking tutorial - Http config backup - Ethical Hacking examples - Ethical Hacking programs
- The output of http-config-backup command is displayed. This site address doesn’t show any cookies values, which means the site is protected.

Learn Ethical Hacking - Ethical Hacking tutorial - Http config backup command - Ethical Hacking examples - Ethical Hacking programs
Read Also
Step 10:
- Type init 20 command ( http-frontpage-login ) which is to get login details and the output are displayed.

Learn Ethical Hacking - Ethical Hacking tutorial - Http front page login - Ethical Hacking examples - Ethical Hacking programs
Step 11:
- Type init 47 command ( http-vhosts ) which is to view verbose status code and the outputs are displayed.

Learn Ethical Hacking - Ethical Hacking tutorial - Http yhosts - Ethical Hacking examples - Ethical Hacking programs
Step 12:
- If you want to learn about Ethical Hacking Course & Kali Linux Tutorial , you can refer the following links Ethical Hacking Training in Chennai , Ethical Hacking tutorial , Hacking Course , Ethical Hacking Course in Chennai