nmap: Idiomatic nmap bindings for go developers

nmap

This library aims at providing idiomatic nmap bindings for go developers, to make it easier to write security audit tools using golang.

nmap go programming

What is nmap

Nmap (Network Mapper) is a free and open-source network scanner created by Gordon Lyon. Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses.

Nmap provides many features for probing computer networks, including host discovery and service and operating system detection. These features are extensible by scripts that provide more advanced service detection, vulnerability detection, and other features. Nmap can adapt to network conditions including latency and congestion during a scan.

Why use go for penetration testing

Most pen test tools are currently written using Python and not Go because it is easy to quickly write scripts, lots of libraries are available, and it’s a simple language to use. However, for writing robust and reliable applications, Go is the better tool. It is statically compiled, has a static type system, much better performance, it is also a very simple language to use and goroutines are awesome… But I might be slightly biased, so feel free to disagree.

Supported features

  •  All of nmap‘s native options.
  •  Additional idiomatic go filters for filtering hosts and ports.
  •  Helpful enums for nmap commands. (time templates, os families, port states, etc.)
  •  Complete documentation of each option, mostly insipred from nmap’s documentation.
  •  Run a nmap scan asynchronously.
  •  Scan progress can be piped through a channel.
  •  Write the nmap output to a given file while also parsing it to the struct.
  •  Stream the nmap output to an io.Writer interface while also parsing it to the struct.
  •  Functionality to show local interfaces and routes.

Example

package main

import (
"context"
"fmt"
"log"
"time"

"github.com/Ullaakut/nmap"
)

func main() {
ctx, cancel := context.WithTimeout(context.Background(), 5*time.Minute)
defer cancel()

// Equivalent to `/usr/local/bin/nmap -p 80,443,843 google.com facebook.com youtube.com`,
// with a 5 minute timeout.
scanner, err := nmap.NewScanner(
nmap.WithTargets("google.com", "facebook.com", "youtube.com"),
nmap.WithPorts("80,443,843"),
nmap.WithContext(ctx),
)
if err != nil {
log.Fatalf("unable to create nmap scanner: %v", err)
}

result, err := scanner.Run()
if err != nil {
log.Fatalf("unable to run nmap scan: %v", err)
}

// Use the results to print an example output
for _, host := range result.Hosts {
if len(host.Ports) == 0 || len(host.Addresses) == 0 {
continue
}

fmt.Printf("Host %q:\n", host.Addresses[0])

for _, port := range host.Ports {
fmt.Printf("\tPort %d/%s %s %s\n", port.ID, port.Protocol, port.State, port.Service.Name)
}
}

fmt.Printf("Nmap done: %d hosts up scanned in %3f seconds\n", len(result.Hosts), result.Stats.Finished.Elapsed)
}

Download

Copyright (c) 2019 Ullaakut