Crimson — AppSec firearm IV

Karol Mazurek
4 min readAug 23, 2022

Guidelines for the crimson_IPcon module usage.

Source: https://creator.nightcafe.studio/creation/iLmHqmEJDDXTw6eu9ZVK

INTRODUCTION

This article will describe how to use the crimson_IPcon most optimally.
The module is used for reconnaissance and vulnerability scanning using IP.

It is good to start the module before the Nessus. It is much quicker and free.

Source: Own study — crimson_IPcon help message.

CRIMSON IPCON GUIDELINES

Issue a single IP address(-i) or the file with the IP addresses(-l) to start.

#EXAMPLE FILE WITH IP ADDRESSES FOR -l FLAG
10.10.10.10
10.10.10.11
10.10.10.12
Source: Own study — starting the crimson_IPcon using single IP addresses with additional flags.
  • -t flag stands for TCP scanning (1–65535).

First Rustscan is checking which ports are opened, and then output is piped to the Nmap which does the banner grabbing.

  • -u flag stands for UPD scanning (only top 1000 ports).

Nmap with banner grabbing.

  • -p flag stands for ICMP sweep.

--

--