nettacker
automated penetration testing framework
TLDR
Scan target for vulnerabilities
SYNOPSIS
nettacker [-i target] [-l file] [-m modules] [-p ports] [-o output] [options]
DESCRIPTION
nettacker is an automated penetration testing framework. It scans for vulnerabilities, performs brute force attacks, and identifies misconfigurations.
Modules target specific vulnerabilities or services: SSH brute force, FTP anonymous access, web vulnerabilities, subdomain enumeration, and more.
The framework supports network scanning, service detection, and exploitation in an automated workflow. Results are collected and reported.
Output formats include HTML reports with graphs, JSON for processing, and text. The D3 graph visualization shows attack paths and findings.
An API server enables integration with other tools and automation frameworks. The web interface provides point-and-click scanning.
This tool is designed for authorized security assessments and penetration testing.
PARAMETERS
-i TARGET
Target (IP, hostname, CIDR).-l FILE
Target list file.-m MODULES
Modules to run (comma-separated).-p PORTS
Ports to scan.-o FILE
Output file.-t N
Number of threads.--timeout SEC
Timeout in seconds.-u USER
Username for brute force.-U FILE
Username list file.-P FILE
Password list file.--method METHOD
Scan method.--graph TYPE
Generate graph (d3_tree, etc.).--api
Run API server.
CAVEATS
Only use with proper authorization. May trigger IDS/IPS alerts. Brute force can cause account lockouts. Some modules are intrusive.
HISTORY
OWASP Nettacker was developed as part of the OWASP (Open Web Application Security Project) as an open-source penetration testing framework. It provides automated security scanning capabilities for security professionals.
SEE ALSO
nmap(1), metasploit(1), nikto(1), sqlmap(1)
