no need script i mag cocommand lang tayo haha..
weh ituro mo full method ng sinasabi mo haha
eto sakin ilatag ko na ,,ikaw yata ang hambog dito...
First, open termux app
type:
1. apt update && apt upgrade
2 .pkg install python (skip this if python is already installed)
3. python -m pip install -U pip
4. pkg install nmap
5. pkg install sslscan
now, we will use 18.?.?2/24 as an example, type:
6. nmap -sL -n 18.?.?.2/24 | awk '/Nmap scan report for /{print $NF}' > FILENAME.txt
it will generate a .txt file that contains the list of IP address within the scanned route.
optional: to confirm if the command was successful, type ls and you will see the FILENAME.txt
next step; type:
7. sslscan, there you will see a list of arguments for sslscan.
we will be using the --tls12 argument since most of the working bughosts are TLS1.2 enabled.
let's proceed; type:
8. sslscan --no-check-certificate --no-cipher-details --no-ciphersuites --no-compression --no-fallback --no-groups --no-heartbleed --no-renegotiation --no-sigs --tls12 --timeout=3 --targets=FILENAME.txt | awk '/Connected/ || /enabled/{print}' > FILENAMEres.txt
change the FILENAME of the targeted file— the one we created in step 6.
optional: change the timeout value with any value you want. i suggest you use 3.
also change the FILENAMEres, make sure you add 'res' which means 'result' to not make it complicated after.
after executing the step 8, it will generate a list of IPs with the ones with TLS1.2 enabled (but you have to wait until it finishes scanning). those that are TLS1.2 enabled are working with noload.
optional: for those who want to monitor the output. type:
sslscan --no-check-certificate --no-cipher-details --no-ciphersuites --no-compression --no-fallback --no-groups --no-heartbleed --no-renegotiation --no-sigs --tls12 --timeout=3 --targets=FILENAME.txt --xml=FILENAMEres.xml
to search for working bughosts from the .xml file, type:
cat FILENAMEres.xml | awk '/sniname/ || /"1"/{print}'
those IP addresses with the word 'enabled' below it are working bughosts.
screenshot ko na ba yyng na scan kong bughost na gumagana ,,haha
para tumahan ka na bossing..