Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/ganesh-k13/titaniumorca
A DDoS and port scan analysis tool
https://github.com/ganesh-k13/titaniumorca
ddos-detection nmap portscan
Last synced: 2 months ago
JSON representation
A DDoS and port scan analysis tool
- Host: GitHub
- URL: https://github.com/ganesh-k13/titaniumorca
- Owner: ganesh-k13
- License: mit
- Created: 2018-02-28T12:49:41.000Z (almost 7 years ago)
- Default Branch: master
- Last Pushed: 2020-11-15T16:05:48.000Z (about 4 years ago)
- Last Synced: 2023-03-02T12:51:17.314Z (almost 2 years ago)
- Topics: ddos-detection, nmap, portscan
- Language: Python
- Size: 2.26 MB
- Stars: 5
- Watchers: 1
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Titanium Orca
A DDoS and port scan analysis tool
### Prerequisites
* scapy_python3==0.23
* dpkt==1.9.1
* scapy==2.4.0rc4
* tabulate==0.8.2### Installing
First install all prerequisites
```
sudo pip3 install -r requirements.txt
```
## Running```
python3 analyser.py [PARAMETERS]...PARAMETERS:
/path/to/*.pcap/file
The common pacaps for evaluation:
- pcap/namp/nmap_standard_scan
- pcap/syn_attack.pcap
Other PCAPS included are:
pcap
├── Attack.pcap #Sample TCP-HALF-OPEN attack
├── hping_syn.pcap # Hping small output
├── nmap # NMAP Ouptut files [SEE README.txt]
│ ├── nmap_ACK_scan_on_port_80
│ ├── nmap_ACK_scan_on_port_80_2
│ ├── nmap_OS_scan
│ ├── nmap_OS_scan_succesful
│ ├── nmap_standard_scan # Standard Portscan
│ └── README.txt
├── portscan.pcap
├── Sample.pcap
└── syn_attack.pcap #Real Life DOS attack on a commercial server
EXAMPLE: python3 analyser.py pcap/namp/nmap_standard_scan # RUN THIS FOR EVALUATAION
```## Sample Input/Output
```
$ python3 analyser.py pcap/portscan.pcapParsing....
Malicious IP Addresses with their SYN Packet Counts:
╒══════════════╤═════════╕
│ IP Adress │ Count │
╞══════════════╪═════════╡
│ 10.100.25.14 │ 29 │
╘══════════════╧═════════╛
Do you wish to see the ports attacked/scanned? (y/n) : y
╒══════════════╤════════╕
│ IP Adress │ Port │
╞══════════════╪════════╡
│ 10.100.25.14 │ 139 │
├──────────────┼────────┤
│ 10.100.25.14 │ 135 │
├──────────────┼────────┤
│ 10.100.25.14 │ 445 │
├──────────────┼────────┤
│ 10.100.25.14 │ 80 │
├──────────────┼────────┤
│ 10.100.25.14 │ 22 │
├──────────────┼────────┤
│ 10.100.25.14 │ 515 │
├──────────────┼────────┤
│ 10.100.25.14 │ 23 │
├──────────────┼────────┤
│ 10.100.25.14 │ 21 │
├──────────────┼────────┤
│ 10.100.25.14 │ 6000 │
├──────────────┼────────┤
│ 10.100.25.14 │ 1025 │
├──────────────┼────────┤
│ 10.100.25.14 │ 25 │
├──────────────┼────────┤
│ 10.100.25.14 │ 111 │
├──────────────┼────────┤
│ 10.100.25.14 │ 1028 │
├──────────────┼────────┤
│ 10.100.25.14 │ 9100 │
├──────────────┼────────┤
│ 10.100.25.14 │ 1029 │
├──────────────┼────────┤
│ 10.100.25.14 │ 79 │
├──────────────┼────────┤
│ 10.100.25.14 │ 497 │
├──────────────┼────────┤
│ 10.100.25.14 │ 548 │
├──────────────┼────────┤
│ 10.100.25.14 │ 5000 │
├──────────────┼────────┤
│ 10.100.25.14 │ 1917 │
├──────────────┼────────┤
│ 10.100.25.14 │ 53 │
├──────────────┼────────┤
│ 10.100.25.14 │ 161 │
├──────────────┼────────┤
│ 10.100.25.14 │ 9001 │
├──────────────┼────────┤
│ 10.100.25.14 │ 65535 │
├──────────────┼────────┤
│ 10.100.25.14 │ 443 │
├──────────────┼────────┤
│ 10.100.25.14 │ 113 │
├──────────────┼────────┤
│ 10.100.25.14 │ 993 │
├──────────────┼────────┤
│ 10.100.25.14 │ 8080 │
├──────────────┼────────┤
│ 10.100.25.14 │ 2869 │
╘══════════════╧════════╛
Do you wish to see if it was a port scan? (y/n): y
IP: 10.100.25.14 : True
```## Tools
* [Python](https://docs.python.org/3/) - Main Platform
* [DPKT](https://pypi.python.org/pypi/dpkt) - Main Packet Analyzer
* [scapy](https://github.com/secdev/scapy) - Main Packet Manipulator## Authors
* **Ganesh K.** - [DarkFate13](https://github.com/DarkFate13)
* **Mohammed Salamuddin**## Acknowledgments
* This is developed as an assignment for Computer Networks Security Course
* Reason for name: "Wave-hunting" Orca whales spy-hop to locate prey on ice floes, and then swim in groups and attack together in parallel to create waves that wash over the floe. Similar to port scans and DDos.