LLM-Network-Scanner is a powerful tool that leverages the OpenAI API and advanced Natural Language Processing (NLP) models to identify and scan network hosts. By using state-of-the-art language models, it automates the process of host discovery, vulnerability scanning, and network analysis. This tool helps network administrators efficiently assess and secure their infrastructure by providing intelligent insights, scanning results, and potential vulnerability reports for each identified host in the network.
Main functionalities:
- Create a custom welcoming banner
- Check the current status of given hosts
- Scan online hosts for open ports
- Perform a detailed scan on open ports
- Find out best tools to dive deeper into specific services
- Generate a custom summary in the image format
- Create a recommendations for findings of each host
- Generate a PDF report with host informations and recommendations
Below is a screenshot from one of the development versions of LLM-Network-Scanner. In red, you can see commands that were generated by OpenAI API and then executed locally on Kali Linux 2024.
LLM Network Scanner makes use of:
- OpenAI Python library (
pip3 install openai
) - FPDF Python library (
pip3 install fpdf
)
We have used Docker environement with opencanary instance to locally test Network Scanner.
sudo docker-compose up latest
Opencanary config files:
# docker-compose.yml
###
image: "opencanary"
#network_mode: "host"
ports:
# FTP
- "21:21"
# SSH
- "22:22"
# TFTP
- "69:69"
# HTTP
- "80:80"
# MYSQL
- "3306:3306"
# RDP
- "3389:3389"
# .opencanary.conf
"tftp.enabled": true,
"rdp.enabled": true,
"ssh.enabled": true,
"mysql.enabled": true,
"https.enabled": false,
"ftp.enabled": true,
"http.enabled": true,
LLM-Network-Scanner repository is intended solely for the purpose of testing and validating scopes of legitimate penetration tests. These tools are designed to assist administrators and auditors in ensuring that networks and devices adhere to predefined standards and guidelines.
The creators and maintainers of this tool are not responsible for any misuse or legal implications arising from its use. Always ensure that you have the proper authorization before performing any configuration analysis.