View Issue Details

IDProjectCategoryView StatusLast Update
0001157Kali LinuxNew Tool Requestspublic2020-02-10 18:09
ReporterJonny Hightower Assigned To 
PrioritynormalSeverityfeatureReproducibilityhave not tried
Status closedResolutionwon't fix 
PlatformIntel x86_64OSKali LinuxOS Version1.0.6
Summary0001157: NEET - Network Enumeration and Exploitation Tool
Description

Neet is a flexible, multi-threaded network penetration test tool which runs on Linux and co-ordinates the use of numerous other open-source network tools to gather as much network information as possible in an easily-understood format. The core identifies network services, the modules test or enumerate those services, and the neet shell provides an integrated environment for processing the results and exploiting known vulnerabilities.

As such, Neet sits somewhere between manually running your own port scans and subsequent tests, and running a fully automated VA tool. Neet has many options which allow the user to tune the test parameters for network scanning in the most reliable and practical way.

Neet is not a point-and-click hacking or vulnerability assessment tool. It is a console-based environment best run under X Windows, designed for the operator to gain a great deal of insight into the operation of the network under test. It is also designed to help reporting by gathering as much evidence as possible.

Neet is maintained on GitHub, and the latest release, with Kali installer, is here:
https://github.com/JonnyHightower/neet/archive/1.1.3.tar.gz

Additional Information

Neet is aimed at professional penetration testers, internal IT security teams and network administrators who wish to know more about what's actually on their network infrastructure, You might want to try it out if you fall into one of those categories.

It has been written (and continues to be developed) by a professional penetration tester over years of engagements, and has been designed explicitly to do the leg-work for you and to make it convenient and safe to get your hands on useful network information before the customer brings your first cup of tea of the day.

Neet has a simple (though powerful and flexible) command-line interface, and gathers a lot of data about the network within its scope. It will give you an up-to-the second view of how many services it's found on the network, what types of services they are, what types of hosts, what their hostnames are, whether they belong to domains, etc. If the modules are enabled (as they are by default) then it will perform tests against certain services - looking for default SNMP community strings and enumerating whatever is possible from SMB services, for example. It will also check for glaring security vulnerabilities and allow you to exploit them if you so choose.

It's not magic, but it does what it says on the tin: network enumeration and exploitation. All the information gathered is stored in plain text files, so they can be grepped and awked as the user sees fit, although as well as storing the raw data, it does aggregate a lot of it into files of related information for easy processing.

There's also a customised shell which takes a lot of the common tasks you'd normally perform and rolls them into simple tasks. For example, the win command lists the Windows hosts on the network, and cross-references them against issues and vulnerabilities found to give you a colour-coded list of live hosts.

And there's documentation too! Check out the man pages, the help command inside the neet shell, and the HTML Wiki document in /opt/neet/doc.

Activities

Jonny Hightower

Jonny Hightower

2014-04-24 20:38

reporter   ~0001728

Created a GitHub Wiki for Neet, with documentation and a feed of news about each release. Also initiated the issue tracking and bug reporting facility, which is linked from the Wiki.

The Wiki can be found here: https://github.com/JonnyHightower/neet/wiki

g0tmi1k

g0tmi1k

2018-01-29 15:05

administrator   ~0008430

To help speed up the process of evaluating the tool, please make sure to include the following information (the more information you include, the more beneficial it will for us):

  • [Name] - The name of the tool
  • [Version] - What version of the tool should be added?
    --- If it uses source control (such as git), please make sure there is a release to match (e.g. git tag)
  • [Homepage] - Where can the tool be found online? Where to go to get more information?
  • [Download] - Where to go to get the tool?
  • [Author] - Who made the tool?
  • [Licence] - How is the software distributed? What conditions does it come with?
  • [Description] - What is the tool about? What does it do?
  • [Dependencies] - What is needed for the tool to work?
  • [Similar tools] - What other tools are out there?
  • [How to install] - How do you compile it?
  • [How to use] - What are some basic commands/functions to demonstrate it?
g0tmi1k

g0tmi1k

2020-02-10 18:09

administrator   ~0012188

Hasn't had an update since 2016, and various other tools do this now

Issue History

Date Modified Username Field Change
2014-04-17 21:42 Jonny Hightower New Issue
2014-04-24 20:38 Jonny Hightower Note Added: 0001728
2014-05-12 17:16 xploitx Issue cloned: 0001206
2018-01-29 15:05 g0tmi1k Note Added: 0008430
2018-02-21 09:35 g0tmi1k Product Version 1.0.6 =>
2019-12-09 13:30 g0tmi1k Severity minor => feature
2020-02-10 18:09 g0tmi1k Note Added: 0012188
2020-02-10 18:09 g0tmi1k Status new => closed
2020-02-10 18:09 g0tmi1k Resolution open => won't fix