Battalion
Battalion copied to clipboard
Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.
Include more thorough examples and explanations of technology. I'll add benchmark data (ie. #requests/subdomain on each scan type, etc.) and other average estimates.
It would be nice for this project to have an introductory demo in the form of a video tutorial or text-based tutorial. This will serve to help consumers and contributors...
Take JSON outputs from various scans and merge them in to one larger file for use with reporting and eventual database creation.
We can get some good summaries of things like # of hosts that use Apache, IIS, PHP, etc. from the WhatWeb results, we just need to write additional parsers.
By default ns1, ns2, [email protected] records should not be scanned by nmap, or other tools apart from testing zone transfers (separate feature) Phase one of this is to remove the...
If the DNS bruteforce returns ns#@domain.com style results, test them for zone transfers and record results if successful.
I noticed that if you ever terminate the battalion script, the rest of the scripts that are running, (since they're background processes) don't terminate along with the main script. Need...
'Zero Touch' - Only non-intrusive tests (public APIs, 3rd party sources, DNS enumeration, etc.) 'Light Touch' - Identify minimal 'packets per site/IP per tool' to get usable data, disable 'noisy'...
The console output doesn't provide any particular value other than an indication of status. Add a `--quiet` flag to allow users to disable it.