• Skip to main content
  • Skip to primary sidebar

ARTISTIC SWAN

Your treasure of information!

  • Home
  • BUSINESS
  • CYBER SECURITY
    • Guides
    • Reviews
    • Tools
    • Videos
    • Information Security Abbreviations
    • Downloads
      • Ransomware Decryptors
  • EDUCATION AND TRAINING
    • BASIC ENGLISH GRAMMAR
  • HEALTH AND FITNESS
  • PETS
  • REFERENCE
  • SCIENCE AND TECHNOLOGY
    • ASTRONOMY
  • TRAVEL
  • Privacy Policy
  • Contact Us
You are here: Home / CYBER SECURITY / Tools / Vanquish – Kali Linux based Enumeration Orchestrator
Vanquish – Kali Linux based Enumeration Orchestrator

Vanquish – Kali Linux based Enumeration Orchestrator

October 14, 2017 By Uma Leave a Comment

Vanquish

Vanquish is a Kali Linux based Enumeration Orchestrator built in Python. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases. The results of each phase are fed into the next phase to identify vulnerabilities that could be leveraged for a remote shell.

 

Vanquish Features

So what is so special about Vanquish compared to other enumeration scripts?

  1. Multi-threaded – Runs multiple commands and scans multiple hosts simultaneously.
  2. Configurable – All commands are configured in a separate .ini file for ease of adjustment
  3. Multiphase – Optimized to run the fastest enumeration commands first in order to get actionable results as quickly as possible.
  4. Intelligent – Feeds the findings from one phase into the next in order to uncover deeper vulnerabilities.
  5. Modular – New attack plans and commands configurations can be easily built for fit for purpose enumeration orchestration.

Getting Started

Vanquish can be installed on Kali Linux using the following commands:

git clone https://github.com/frizb/Vanquish
cd Vanquish
python Vanquish2.py -install
vanquish --help

Once Vanquish is installed you can scan hosts for leveraging the best of breed Kali Linux tools:

echo 192.168.126.133 >> test.txt
vanquish -hostFile test.txt -logging
echo review the results!
cd test
cd 192_168_126_133
ls -la

What Kali Tools does Vanquish leverage?

| NMap | Hydra | Nikto | Metasploit | | Gobuster | Dirb | Exploitdb | Nbtscan | | Ntpq | Enum4linux | Smbclient | Rpcclient | | Onesixtyone | Sslscan | Sslyze | Snmpwalk | | Ident-user-enum | Smtp-user-enum | Snmp-check | Cisco-torch | | Dnsrecon | Dig | Whatweb | Wafw00f | | Wpscan | Cewl | Curl | Mysql | Nmblookup | Searchsploit | | Nbtscan-unixwiz | Xprobe2 | Blindelephant | Showmount |

Running Vanquish

  • CTRL + CCTRL + C to exit an enumeration phase and skip to the next phase (helpful if a command is taking too long) Vanquish will skip running a command again if it sees that the output files already exist. If you want to re-execute a command, delete the output files (.txt,.xml,.nmap etc.) and run Vanquish again.
  • CTRL + ZCTRL + Z to exit Vanquish.
  • Resume ModeVanquish will skip running a command again if it sees that the output files already exist.
  • Re-run an enumeration commandIf you want to re-execute a command, delete the output files (.txt,.xml,.nmap etc.) and run Vanquish again.

Download

Filed Under: Tools Tagged With: Vanquish

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Archives

Recent Posts

  • The Universe
  • Top 50 DB2 Interview Questions and Answers for Professionals
  • Microsoft Windows Versions
  • Country Code – Country Calling Codes
  • Complex Sentences

Categories

Recent Comments

  • John Deere Technical Manuals on Microsoft Windows Versions
  • P on How Hackers Hacked into Bitcoin Wallet [DEMO]
  • Gabriel on Deep Web – Best Onion Links
  • Marce3l on Deep Web – Best Onion Links

Copyright © 2023 • Android RAT • Onion Links