View Issue Details

IDProjectCategoryView StatusLast Update
0008413Kali LinuxNew Tool Requestspublic2023-09-14 11:36
Reporterwearecaster Assigned To 
PrioritynormalSeverityminorReproducibilityhave not tried
Status closedResolutionsuspended 
Summary0008413: Above, Network Protocols Sniffer for Vulnerability Scanning
Description

Almost a year ago I wrote "Above", it is a autonomous vulnerability scanner, it listens to traffic and based on the values in the flows identifies vulnerabilities that lead to network attacks.
It's far from perfect right now, but I plan to update it with a multi-threading feature and refactoring in the near future. I want to do this specifically to submit it to Kali Linux.
Please tell me if you are interested in this tool and should I take the job? I want to discuss this in advance so that we don't waste each other's time.
I guess this tool might end up in the "Information Gathering" tools section of Kali Linux :)

Above supports 18 protocols with detailed vulnerability information as well as applicable utilities on how you can attack the network.
Support for the following protocols:
MACSec (802.1AE)
DTP (Dynamic Trunking Protocol)
EDP (Extreme Discovery Protocol)
CDP (Cisco Discovery Protocol)
LLDP (Link Layer Discovery Protocol)
MNDP (Mikrotik Neighbor Discovery Protocol)
OSPF (Open Shortest Path First)
EIGRP (Enhanced Interior Gateway Routing Protocol)
VRRP (Virtual Router Redundancy Protocol)
HSRP (Host Standby Redundancy Protocol)
ESRP (Extreme Standby Router Protocol)
GLBP (Gateway Load Balancing Protocol)
STP (Spanning Tree Protocol)
PVST (Per VLAN Spanning Tree)
LLMNR (Link Local Multicast Name Resolution)
NBT-NS (NetBIOS Name Service)
MDNS (Multicast DNS)
DHCPv6 (Dynamic Host Configuration Protocol v6)

Additional Information

Tool link: github.com/wearecaster/Above
Contact: [email protected]

Activities

g0tmi1k

g0tmi1k

2023-08-25 14:07

administrator   ~0018379

https://github.com/wearecaster/Above

g0tmi1k

g0tmi1k

2023-08-25 14:12

administrator   ~0018380

This repository has been archived by the owner on Aug 7, 2023. It is now read-only.

g0tmi1k

g0tmi1k

2023-08-25 14:13

administrator   ~0018381

Thanks for the suggestion @wearecaster ,

If this is your project and then the repo (https://github.com/wearecaster/Above), can you say why it was archived?

wearecaster

wearecaster

2023-08-25 14:51

reporter   ~0018382

I archived this repository due to the fact that this tool is currently not satisfying me with some bugs and I archived Above until my 2.1 update, where I will fix bugs with traffic handling and add multitreading and code refactoring. The 2.1 release will be in September 2023.

@g0tmi1k

wearecaster

wearecaster

2023-09-12 09:11

reporter   ~0018463

12.09.2023 - Unarchived the repository, I am now actively working on release 2.1 where I will add multithreading to the scanner so that protocol sniffing happens simultaneously and also do some refactoring to make the code design look good. And I will also improve the design of the vulnerability information output.

wearecaster

wearecaster

2023-09-13 10:39

reporter   ~0018471

By the way, an interesting detail: this tool comes in handy not only for Offensive-engineers, but also for Defensive-engineers to identify network security problems within a segment.

g0tmi1k

g0tmi1k

2023-09-14 11:35

administrator   ~0018478

Thanks for getting back to us.
We will wait for this tool to become more mature before we package it up.

Issue History

Date Modified Username Field Change
2023-08-07 12:44 wearecaster New Issue
2023-08-25 14:07 g0tmi1k Note Added: 0018379
2023-08-25 14:12 g0tmi1k Note Added: 0018380
2023-08-25 14:13 g0tmi1k Note Added: 0018381
2023-08-25 14:51 wearecaster Note Added: 0018382
2023-09-12 09:11 wearecaster Note Added: 0018463
2023-09-13 10:39 wearecaster Note Added: 0018471
2023-09-14 11:35 g0tmi1k Note Added: 0018478
2023-09-14 11:36 g0tmi1k Status new => closed
2023-09-14 11:36 g0tmi1k Resolution open => suspended