Comprehensive Guide to Network Security Assessment: Features, Installation, and Usage

About NetworkAssessment

NetworkAssessment is a powerful network security threat assessment and auditing tool designed to assist researchers in analyzing pcap files and detecting potential suspicious network traffic within a target network. With the help of this tool, network security auditors can more easily scan and identify anomalous activities within network traffic and search for suspicious keywords.

Feature Overview

1. DNS Tunnel Detection: Identify potential covert communication channels via DNS;

2. SSH Tunnel Detection: Detect traces of SSH sessions, which may be used to bypass network restrictions or conceal malicious activities;

3. TCP Session Hijack Identification: Monitor suspicious TCP sessions that might indicate unauthorized takeover activities;

4. Identification of Various Attack Characteristics: Recognize SYN flood, UDP flood, Slowloris, SMB attacks, etc.;

5. Suspicious Keyword Search: Proactively scan network traffic for user-defined keywords that may indicate malicious or sensitive data leaks;

6. Support for Protocol-Specific Scans: Allow users to specify protocols to monitor, ensuring focused and efficient analysis;

7. Output Logging: Support storing detailed analysis results in files for further review and research;

8. IPv6 Fragmentation Attack Detection: Identify potential behaviors exploiting IPv6 fragmentation mechanisms for malicious activities;

9. User-Friendly Interface: Color-coded output and progress indicators enhance data readability and user experience;

The tool is not limited to the above features. With contributions from a wide community of researchers, its detection capabilities can continuously develop and adapt to the latest threat landscapes.

Tool Requirements

  • python 3.x
  • scapy
  • argparse
  • pyshark
  • colorama

Tool Installation

Since the tool is developed based on Python 3, we first need to install and configure the Python 3.x environment on the local device. Next, researchers can directly use the following command to clone the project source code to local:

git clone https://github.com/HalilDeniz/NetworkAssessment.git

Then switch to the project directory and use the pip tool and the provided requirements.txt file to install the additional dependencies needed by the tool:

cd NetworkAssessment

pip install -r requirements.txt

Tool Usage

Example Usage

python3 networkassessment.py [-h] -f FILE [-p {TCP,UDP,DNS,HTTP,SMTP,SMB} [{TCP,UDP,DNS,HTTP,SMTP,SMB} ...]]

                            [-o OUTPUT] [-n NUMBER_PACKET]

(Swipe right for more)

Parameter Explanation

-f, –file: The path to the .pcap or .pcapng file to be analyzed, this is a mandatory parameter, and the tool’s security assessment is primarily based on the data within this file;

-p, –protocols: Specify protocols to scan, supporting multiple protocols at the same time. Options include “TCP”, “UDP”, “DNS”, “HTTP”, “SMTP”, and “SMB”;

-o, –output: The output file path to store scan analysis results, this parameter is optional. If set, the scan results will be saved in the specified output file;

-n, –number-packet: The number of data packets to scan within the specified file, this parameter is optional. If not set, the tool will default to scanning all data packets in the target file;

In the above example, the tool will analyze the first 1000 data packets in the sample.pcap file, primarily focusing on TCP and UDP protocols, and save the analysis results to the output.txt file.

Tool Running Screenshot

Network security assessment

License Agreement

This project is developed and released under the MIT open-source license agreement.

Project Address

NetworkAssessment

https://github.com/HalilDeniz/NetworkAssessment

Network security assessment

https://tryhackme.com/p/halilovic
https://github.com/alperenugurlu

StorageNetwork SecuritypcapToolsProtocols