Linux Automated Security scanning Tool
the LAST tool you will ever use!
This tool is used to automate the recon proces of Red Team Excercises. It gathers all the information and reports it back in an easy to read format. The script is made so it is possible for everyone to include his own plugins and addons.
install.sh
/etc/init.d/nessusd start
, then activate it and create a user account.config/apikey.conf
like this: accessKey=X;secretKey=X
.config/nmap.conf
(see below)Nessus will be started automatically when needed by the script
You can just run this script on any linux system like ./last.sh
or sh last.sh
Here you can define the IP addresses to be scanned.
Supported notations:
This conf file contains your nessus api keys in the form of: accessKey=X;secretKey=X
Replace the X’s with your corresponding keys.
Integrated in LAST.sh.
Run this tool to convert the output we got from Nessus & nmap to create one summary JSON file.
The output json follows the following structure:
If you have your own plugin and want to add any found data to the master.json file.
Note: the -f parameter is required, it has to be a json from a valid structure
The valid structure is:
The main Key should be an IP-Address, with a json as value.
You can create any keyname but if you have vulnerabilities, add a Vulnerabilities key with json value.
Example: