Skip to content

Simple Scan Detector - simple tool to detect scans patterns on network.

Notifications You must be signed in to change notification settings

rafabd1/SimpleScanDetector

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Simple Scan Detector - Documentation

Overview

This is a basic scan detection system developed in Python using the Scapy library. It can detect various types of scans, such as port scans, fragmentation evasion, decoy scans, UDP scans, and service/OS reconnaissance. The program logs scan events with detailed information.

Note: This project is a simple example of a basic scan detection system and is meant for educational purposes.

Detection Types

  1. TCP Port Scan: Detects attempts to probe TCP ports.
  2. UDP Scan: Detects attempts to probe UDP ports.
  3. Fragmentation Evasion: Identifies fragmented packets, a technique used to avoid detection.
  4. Decoy Scan: Detects attempts to disguise the source using fake IPs (decoys).
  5. Service/OS Reconnaissance: Detects attempts to identify services and operating systems running on open ports.

How to Run

  1. Clone the Repository:

    git clone https://github.com/Rafael-BD/SimpleScanDetector.git
    cd SimpleScanDetector
  2. Install Dependencies: Ensure that you have Python and Scapy installed:

    pip install -r requirements.txt
  3. Edit the Configuration File: Open the config.yaml file to adjust settings according to your environment:

    • interface: Network interface where the sniffer will operate.
    • time_window: Time window in seconds to consider connection attempts.
    • port_threshold: Minimum number of different ports that indicate a possible scan.
    • fragmentation_limit: Limit of packet fragments before considering evasion.
  4. Run the Detector (as administrator):

    sudo python main.py
  5. Manual Testing with Nmap

    TCP Port Scan:

    sudo nmap -sS <target IP address>

    UDP Scan:

    sudo nmap -sU <target IP address>

    Decoy Scan:

    sudo nmap -D RND:10 <target IP address>

    Fragmentation Evasion:

    sudo nmap -f <target IP address>

    Service/OS Reconnaissance:

    sudo nmap -A <target IP address>

Logs

Logs generated by the detector are stored in the logs/ directory with the format scan_detector_<date>_<time>.log. Each detection event is logged with a timestamp, including the type of scan detected and the source IP.

About

Simple Scan Detector - simple tool to detect scans patterns on network.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages