Scanners
Scanners in OctoPwn automate network reconnaissance, vulnerability detection, and service enumeration across multiple targets. Unlike clients, which enable direct interaction with protocols (e.g., SMB, LDAP) for manual exploitation, scanners perform bulk operations to identify misconfigurations, exposed services, and vulnerabilities at scale.
Getting started
- Configure Targets: Enter the ID of your target or use any of the format described in the plugin details.
- Set Credentials: Store credentials (passwords, hashes, certificates) in the Credentials Hub. You need to enter the id of the credential
- Set Proxy: The default proxy has the id
0
. Alternatively you can chain through to another proxy if you want to scan in a network that is not available to your host. - Launch Scanner: Select a scanner, specify
targets
(e.g.,g:domain_controllers
), and set parameters (e.g., scan depth). - Analyze Results: Credentials will be added to octopwn automatically. Results will be shown either directly in the scanner window or will be available as a file in the file browser under
/browserfs/volatile
. Be sure to export any file before reloading/exiting ocotopwn, as the volatile storage will be deleted by the browser.