Tuesday, April 22, 2025
HomeVulnerability AnalysisPerform Vulnerability Scanning in Your Network using Maltego

Perform Vulnerability Scanning in Your Network using Maltego

Published on

SIEM as a Service

Follow Us on Google News

Maltego is an intelligence-gathering tool, that is available for Windows, Mac, and Linux. We will be using Kali Linux where it’s known by default. Remember to register on their website and I have it configured.

There are a lot of things Maltego can do not just information gathering it can also brute force a website login page, SQL injection, and scanning the targets. Now we will be looking at how to do a quick Vulnerability scan on a website using Maltego.

Also Read the Complete list of Kali Linux Tutorials

- Advertisement - Google News

Open a terminal and type “ maltegoce ”. You should have it up and running, register and make sure you give a legit email id since they will be sending confirmation links, etc. Now it will ask you to start a machine.

Installing Maltego Teeth

Open the terminal and type in “apt-get install maltego-teeth“.

After installing Maltego teeth, we will have to import the configuration file from the following location /opt/Teeth/etc/Maltego_config.mtz.
select all the entities and click next and finish.

Press Ctrl + t. you will have a blank graph open in front of you. To your left you will be having the palette, play around with it you can see a lot of entities like banners, ports, websites, etc.  Drag the website entity to the blank graph and type in the website you want.

Now let’s try to obtain the IP address through reverse DNS to IP. Scroll down the run view to find “To IP Address [DNS]”

Then click on the IP address and to your left search for the local transform “TTNMAPPLUS“ and click on the play button, it’s going to take a minute or two depending upon your internet connection speed to pop up the results. it will show the open ports.

Maltego

Now select all the ports, do a banner grabbing, and show the services associated with those ports using ” TTservicetoPort” and “TTServiceToBanner”.

Maltego

We will do a quick vulnerability scanning using “TTquickVulnSearch” to see if maltego picks anything juicy.

Maltego

Maltego found that the web server was running a Debian 5 server which is really old and prone to many vulnerabilities. it also shows what types of vulnerabilities are listed in the details view to the right.

Also, Read

Hackers Massively Scanning for SAP Recon Vulnerability

10 Best Vulnerability Scanner Tools For Penetration Testing – 2023

hping3 – Network Scanning Tool – Packet Generator

Latest articles

Infostealer Attacks Surge 84% Weekly Through Phishing Emails

The volume of infostealer malware distributed through phishing emails has surged by 84% week-on-week...

North Korean IT Workers Use Real-Time Deepfakes to Infiltrate Organizations Through Remote Jobs

A division of Palo Alto Networks, have revealed a sophisticated scheme by North Korean...

New Phishing Technique Hides Weaponized HTML Files Within SVG Images

Cybersecurity experts have observed an alarming increase in the use of SVG (Scalable Vector...

Detecting And Blocking DNS Tunneling Techniques Using Network Analytics

DNS tunneling is a covert technique that cybercriminals use to bypass traditional network security...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Google Launches Open-Source OSV-Scanner for Detecting Security Vulnerabilities

Google has announced the launch of OSV-Scanner V2, an open-source tool designed to enhance vulnerability...

New Microsoft Windows GUI 0-Day Vulnerability Actively Exploited in the Wild

A newly discovered vulnerability in Microsoft Windows, identified by ClearSky Cyber Security, is reportedly...

Fortinet FortiOS & FortiProxy Zero-Day Exploited to Hijack Firewall & Gain Super Admin Access

Cybersecurity firm Fortinet has issued an urgent warning regarding a newly discovered zero-day authentication...