# Enhance Your Business Security with Exnoscan
Written on
Chapter 1: Introduction to Exnoscan
Exnoscan is an effective Bash script designed to help you uncover potential security vulnerabilities. Often, we only keep track of what we know, but Exnoscan focuses on revealing what may be overlooked. It leverages multiple tools to carry out its tasks, which include:
Section 1.1: How to Execute Exnoscan
After ensuring all dependencies are installed, download the script and execute it using the command bash exnoscan.sh. This action will fetch the required files into your working directory (excluding TheHarvester).
Before running the scan, you must populate the domains.txt file located in the scan folder. Here's a breakdown of the required files:
- domains.txt: Fill this with email domains to facilitate subdomain enumeration.
- iplist.txt: This is for IPs or CIDR notation that you want to scan with Nmap.
- urls.txt: Input any custom URLs you wish to examine using both Nmap and Dirsearch.
Once these files are filled out to your satisfaction, you can rerun the script with bash exnoscan.sh.
Subsection 1.1.1: The Scanning Process
The script follows a structured approach:
- Utilizes domains.txt for subdomain enumeration.
- Executes nc to identify common web hosts.
- Scans each identified site for hidden directories.
- Compiles a list for scanning based on all three text files.
- Conducts an Nmap scan on the list.
- If installed, runs email enumeration.
- Moves all results to a designated folder and compresses them using the current date as the filename.
Section 1.2: Understanding the Outcomes
Upon completion of the scan, you will find a compressed folder containing various results that should provide insights into your external exposure. The emailsfound file aims to highlight email addresses that may be targeted for phishing attacks.
Chapter 2: Automating the Process
To streamline the handling of these results, I prefer to automate the process. Since I utilize Azure for my operations, I combine a storage account with a logic app.
The storage account is integrated with my Kali box via BlobFuse. After the script execution, the $D folder is transferred to a container in my blob storage. The logic app detects this action and automatically emails the compressed results to me.
With this setup, the script can be scheduled to run via cron, allowing for a largely automated workflow.
The first video, "Top 5 Ways to Secure Your Business Online," provides essential strategies for protecting your online business presence.
In the second video, "How to Protect the Privacy of Your Small Business," you’ll learn valuable tips for safeguarding your business's sensitive information.