Dracnmap is an open-source program that is utilizing to misuse the system and gathering data with Nmap help. Nmap command accompanies bunches of choices that can make the utility progressively hearty and hard to pursue new users. Subsequently, Dracnmap is intended to perform quick scanning with the using content motor of Nmap, and Nmap can perform different programmed checking systems with the propelled commands.
To install this tool, visit the “https://github.com/Screetsec/Dracnmap“ web page and copy the downloadable link.
Change your directory to “/opt” and use the “git clone” command to download the tool.
Ex: (root@kali:/opt# git clone https://github.com/Screetsec/Dracnmap.git).
Go to the “/Dracnmap” directory and change the mode of the “dracnmap-v2.2.sh” file to an executable.
Ex: (root@kali:/opt/Dracnmap# chmod +x dracnmap-v2.2.sh).
To start the tool, use the following command, and you’ll be presented with the main menu page.
Ex: (root@kali:/opt/Dracnmap# ./dracnmap-v2.2.sh).
Let’s perform a regular scan, to do so, select the option number “1”. Then provide the target host’s IP address and hit “Enter.”
Dracnmap will use the Nmap scanning techniques and list all possible information regarding the target machine’s open ports and running services.
You may also use other options for OS version detection, firewall evasion, and web services detection.
Dracnmap simplifies the Nmap tool’s complexity by grouping its features into several categories. Each category has its own set of possibilities for automating penetration testing.