Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Skip the nmap scan, if target list is full of open rtsp IPs #276

Open
bejaranoo opened this issue Feb 19, 2021 · 2 comments
Open

Skip the nmap scan, if target list is full of open rtsp IPs #276

bejaranoo opened this issue Feb 19, 2021 · 2 comments

Comments

@bejaranoo
Copy link

Is there a way to skip the nmap scan and go straight to the attacking routes? In case i already know the target list is full of open rtsp port IPs.

@Ullaakut
Copy link
Owner

Hi @bejaranoo ! At the moment, no it is not the case. However that is certainly a feature that shouldn't be very difficult to add. Simply adding a flag to disable the discovery phase and take a file input for the list of targets should be enough.

@brunhuber
Copy link

Hi Ullakut. Awesome job on this tool and thanks for sharing it with the community.
Indeed skipping NMAP would be awsome as most likely we are feeding the IP`s already scanned.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants