AMAP v2.3  NGST (Next Generation Scanning Tool)


Introduction.
-------------

This is a public release of Amap v2.3. Amap is a next-generation scanning
tool for pentesters. It attempts to identify applications even if they are
running on a different port than normal. 
It also identifies non-ascii based applications. This is achieved by sending
trigger packets, and looking up the responses in a list of response strings. 

Without filled databases containing triggers and responses, the tool is
worthless, so I ask you to help us fill the database. How to do this? Well,
whenever a client application connects to a server, some kind of handshake
is exchanged (at least, usually. Syslogd for instance won't say nothing, and
snmpd without the right community string neither). Anyway, amap takes the
first packet sent back and compares it to a list of signature responses. Really
simple, actually. And in reality, it turns out really to be that simple,
at least, for most protocols.

So now, with amap, you can identify that SSL server running on port 3442, 
as well as that Oracle listener on port 23. 

For unknown protocols, you can use amapcrap, which sends random crap to a
udp, tcp or ssl'ed port, to illicit a response, which you can then
put into the appdefs.trig and appdefs.resp files.

Installing.
-----------

Type:

make install

The triggers and responses.
---------------------------

Take a look at the supplied appdefs.trig and appdefs.resp files.
Much will become clear then.

Essentials.
-----------

Amap takes nmap -m output files as input. You can specify a single IP
address and port on the command line, but usually, you'd run it from a nmap
file, thusly:

amap -i results.nmap -o results.amap -m

or:

amap -sT -S 127.0.0.1 443

Other switches and options can be seen by typing:

amap -h

Contributing.
-------------

Send us the initial packets (sent and received) in tcpdump format for all
wacko, proprietary and obscure applications. Send them to:
amap-defs@tink.org. Please include application name and version. A
web-enabled interface with uploader will become available soon for your
convenience. 

Bugs.
-----

Probably many. Send bugreports to amap-bugs@tink.org. 

To do.
------

see the TODO file


TNX.
----

T1nk, van Hauser, Guido van Rooij, Unicorn, Arhab and many others who sent
me triggers and responses.
