Automated network reconnaissance and vulnerability identification with CVE mapping
The Network Vulnerability Scanner performs comprehensive network reconnaissance including host discovery, port enumeration, service fingerprinting, and OS detection. It leverages Nmap under the hood and enriches results with CVE lookups, NIST control mappings, and risk scoring. Output is produced in both structured JSON (for pipeline integration) and human-readable Markdown reports.
Specify the target IP range or subnet. Ensure you have written authorization (Rules of Engagement) before scanning any network.
# Single host
python3 network_scan.py --target 192.168.1.1 --output report.md
# Subnet range
python3 network_scan.py --target 192.168.1.0/24 --output report.mdRun the scanner with sudo for full SYN scan and OS detection capabilities. The script automatically performs host discovery, port scanning, service fingerprinting, and vulnerability assessment.
sudo python3 network_scan.py \
--target 10.0.0.0/24 \
--output /reports/network_scan.mdOpen the generated Markdown report to review discovered hosts, open ports, identified services, and flagged vulnerabilities with their risk scores.
Feed the JSON output into the Risk Assessment & Reporting skill for consolidated scoring and POA&M generation.
python3 risk_report.py import-findings \
--project my-audit \
--file /reports/network_scan.jsonScan a single host with default settings (top 1000 ports, service detection, OS fingerprinting).
python3 network_scan.py --target 192.168.1.1 --output scan_report.mdScanning 192.168.1.1... Host: 192.168.1.1 (Status: up) Port 22/tcp open ssh OpenSSH 8.9p1 Port 80/tcp open http Apache 2.4.52 Port 443/tcp open https Apache 2.4.52 OS Detection: Linux 5.15 (98% confidence) Vulnerabilities found: 1 Report saved to: scan_report.md
{
"scan_metadata": {
"target": "127.0.0.1",
"scan_date": "2026-03-01T11:30:00Z",
"nmap_version": "7.94",
"scan_type": "SYN + Service Detection + OS"
},
"hosts": [
{
"ip": "127.0.0.1",
"status": "up",
"os_match": "Linux 2.6.32 (96%)",
"ports": [
{
"port": 22,
"protocol": "tcp",
"state": "open",
"service": "ssh",
"version": "OpenSSH 8.9p1",
"risk_score": 3,
"risk_level": "LOW"
},
{
"port": 5900,
"protocol": "tcp",
"state": "open",
"service": "vnc",
"version": "VNC",
"risk_score": 16,
"risk_level": "HIGH",
"vulnerability": "VNC port exposed without encryption"
}
]
}
],
"summary": {
"hosts_discovered": 1,
"open_ports": 4,
"vulnerabilities": 1
}
}# Network Vulnerability Scan Report
**Target:** 127.0.0.1 | **Date:** 2026-03-01 | **Framework:** NIST SP 800-115
## Port Scan Results
| Port | Proto | State | Service | Version | Risk |
|------|-------|-------|---------|---------|------|
| 22 | tcp | open | ssh | OpenSSH 8.9p1 | LOW |
| 5900 | tcp | open | vnc | VNC | HIGH |
## Vulnerabilities
### HIGH: VNC Port 5900 Exposed
- **Risk Score:** 16 (Likelihood: 4 × Impact: 4)
- **NIST Control:** SC-7 (Boundary Protection)
- **Remediation:** Restrict VNC access via firewall; use VPN tunnelMonitor and scan for vulnerabilities in organizational systems and hosted applications.
Conduct penetration testing on organizational systems.
Identify, report, and correct system flaws in a timely manner.
Monitor and control communications at external and key internal boundaries.