• Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Menu
  • Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Search
Close
  • Home
  • 2018
  • January
  • 30
  • Prowler – Cluster Network Vulnerability Scanner

Prowler – Cluster Network Vulnerability Scanner

January 30, 2018January 28, 2018 Comments Off on Prowler – Cluster Network Vulnerability Scanner
download prowler scanner how to use prowler scanner Prowler - Cluster Network Vulnerability Scanner prowler scanner prowler tutorial

Prowler is a Cluster Network Vulnerability Scanner, developed during Singapore Infosec Community Hackathon – HackSmith v1.0. It is implemented on a cluster of Raspberry Pi and it will scan a network for vulnerabilities, such as default/weak credentials, that can be easily exploited.

Capabilities

  • Scan a network (or a particular subnet) for all IP addresses associated with active devices
  • Determine if there are any open ports on the device
  • Associate the ports with common services
  • Test devices against a dictionary of factory default and common credentials
  • Notify users of security lapses through an online dashboard

Demos

  • Cluster Scan Demonstration Jupyter Notebook
  • Single Scan Demonstration Jupyter Notebook
  • Try out the web dashboard here

Hardware

  • Raspberry Pi Cluster HAT (with 4 * Pi Zero W)
  • Raspberry Pi 3
  • No external router needed!

Software Stack

  • Raspbian Stretch (Controller Pi)
  • Raspbian Stretch Lite (Worker Pi Zero)
  • Note: For ease of setup, use the images provided by Cluster Hat! Instructions
  • Python 3
  • Firebase Real-time Database (to forward the information to the web dashboard)
  • Bonus tool: pssh for executing SSH commands on all 4 pi zeros simultaneously.

Deploying Prowler

  1. Clone the git repository: git clone https://github.com/tlkh/prowler.git
  2. Install dependencies by running sudo pip3 install python-libnmap dispy paramiko pyrebase on the controller Pi
  3. From the controller Pi, SSH into each of the worker Pi using ssh pi@p1.local … ssh pi@p4.local and run the same command on each: sudo pip3 install python-libnmap dispy paramiko pyrebase
  4. Install telepot on the controller Pi by running sudo pip3 install telepot if you want to try running the Telegram bot.
  • dispy (website) is the star of the show. It allows allows us to create a job queue that will be processed by the worker Pi Zeros.
  • python-libnmap is the python wrapper around nmap, an open source network scanner. It allows us to scan for open ports on devices.
  • paramiko is a python wrapper around SSH. We use it to probe SSH (port 22) on devices to test for common credentials.
  • pyrebase is needed to upload our results to a Firebase Real-time Database
  1. Run clusterhat on on the controller Pi to ensure that all Pi Zeros are powered up.
  2. Use pssh to run the command /home/pi/dispy/py3/dispy/dispynode.py --clean --daemon& on the four Pi Zeros
  3. Run python3 compute.py on the controller Pi to start Prowler

To edit the range of IP addresses being scanned, edit the following lines in compute.py:

test_range = []

    for i in range(0, 1):
    
        for j in range(100, 200):
        
            test_range.append("172.22." + str(i) + "." + str(j))

Useful Snippets

  • To run ssh command on multiple devices pssh -h pssh-hosts -l username -A -i "command"
  • To create the cluster (in compute.py): cluster = dispy.JobCluster(compute, nodes='pi0_ip', ip_addr='pi3_ip')
  • Check connectivity: ping p1.local -c 1 && ping p2.local -c 1 && ping p3.local -c 1 && ping p4.local -c 1
  • Temperature Check: /opt/vc/bin/vcgencmd measure_temp && pssh -h workers -l pi -A -i "/opt/vc/bin/vcgencmd measure_temp" | grep temp
  • rpimonitor (how to install):

more random graphs

Post navigation

PHP-Webshells
Cyber War (Documentary Film)

Related Articles

Syhunt Community 6.7 – Web And Mobile Application Scanner

- Vulnerability Scanners
October 1, 2019

OpenVAS – Open Vulnerability Assessment System

- Vulnerability Scanners
August 6, 2019August 6, 2019

XSpear: Powerfull XSS Scanning and Parameter Analysis tool

- Cross Site Scripting, Vulnerability Scanners
July 27, 2019
hacker gadgets
hacker phone covers

Recent Posts

Samba Issues Security Updates to Patch Three Vulnerabilities

Samba Issues Security Updates to Patch Three Vulnerabilities

March 31, 2023
New APT Exploits Zimbra Vulnerability to Target European Military and Diplomatic Entities

New APT Exploits Zimbra Vulnerability to Target European Military and Diplomatic Entities

March 30, 2023
MSI Dump - A Tool That Analyzes Malicious MSI Installation Packages, Extracts Files, Streams, Binary Data And Incorporates YARA Scanner

MSI Dump – A Tool That Analyzes Malicious MSI Installation Packages, Extracts Files, Streams, Binary Data And Incorporates YARA Scanner

March 30, 2023
aerleon: Generate firewall configs for multiple firewall platforms

aerleon: Generate firewall configs for multiple firewall platforms

March 30, 2023
hashtopolis v0.13.1 released: A Hashcat wrapper for distributed hashcracking

hashtopolis v0.13.1 released: A Hashcat wrapper for distributed hashcracking

March 30, 2023
Artemis: modular web reconnaissance tool and vulnerability scanner

Artemis: modular web reconnaissance tool and vulnerability scanner

March 29, 2023

Social Media Hacking

SocialPath – Track users across Social Media Platforms

SocialPath – Track users across Social Media Platforms

- Social Media Hacking
October 16, 2019October 16, 2019

SocialPath is a django application for gathering social media intelligence on specific username. It checks for Twitter, Instagram, Facebook, Reddit...

SocialScan – Check Email Address and Username Availability on Online Platforms

SocialScan – Check Email Address and Username Availability on Online Platforms

June 17, 2019
Shellphish – Phishing Tool For 18 Social Media Apps

Shellphish – Phishing Tool For 18 Social Media Apps

June 10, 2019July 27, 2019
WhatsApp Hacking using QRLJacking

WhatsApp Hacking using QRLJacking

May 2, 2019May 19, 2019
How to Hack any Facebook Account with Z-Shadow

How to Hack any Facebook Account with Z-Shadow

April 26, 2019June 29, 2020
hacker buffs

About Us

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Join Our Community!

Please wait...
Get the latest News and Hacking Tools delivered to your inbox.
Don't Worry ! You will not be spammed

Active Members

Submit a Tool

Hackers Handbook 2018


Grab your copy here

ABOUT US

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Our primary focus revolves around the latest tools released in the Infosec community and provide a platform for developers to showcase their skillset and current projects.

COMPANY
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Menu
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Live Chat
RESOURCES
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Menu
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Get Started
TOOLBOX
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Menu
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Tools Directory

2014 – 2020 | Haxf4rall.com               Stay Connected:

Facebook Twitter Google-plus Wordpress
Please wait...

Join Our Community

Subscribe now and get your free HACKERS HANDBOOK

Don't Worry ! You will not be spammed
SIGN UP FOR NEWSLETTER NOW