netcrawl.tools package

Submodules

netcrawl.tools.find_unknown_switches module

Created on Mar 17, 2017

@author: Wyko

netcrawl.tools.find_unknown_switches.run_find_unknown_switches(filter_device_name=[], filter_interface_name=[], filter_manufacturer=[], min_macs=3)[source]

netcrawl.tools.locate_mac module

netcrawl.tools.locate_mac – Lists the devices and ports that the specified MAC was seen on

@author: Wyko ter Haar @license: MIT @contact: vegaswyko@gmail.com

netcrawl.tools.locate_mac.locate(macs)[source]
netcrawl.tools.locate_mac.main(argv=None)[source]

Command line options.

netcrawl.tools.mac_audit module

netcrawl.tools.mac_audit.evaluate_mac(mac1, mac2)[source]
netcrawl.tools.mac_audit.main()[source]

Begins the audit. Outputs a csv file containing the audit results.

netcrawl.tools.mac_audit.run_audit(csv_path)[source]

Given a CSV of subnets and MAC addresses, search the database for all MACs on subnets which match those in the CSV. Compare each MAC and output a new csv with any matching MAC’s listed by confidence (number of matching characters, starting from the OUI. This can be used, for example, for a Wireless Rogue SSID audit, for which the MAC address of the radios is known and you want to find out which rogue AP’s are physically connected to your network.

netcrawl.tools.mac_audit.sort_csv_by_subnet(csv_rows)[source]

Takes a list of dicts with ‘network_ip’ and ‘mac’ as keys, then produces a dict of lists containing subnets and the mac addresses associated with them

netcrawl.tools.mac_audit.write_csv(rows)[source]
netcrawl.tools.mac_audit.write_report(rows)[source]

Module contents