MESH by Viscount Vulnerability Scanner MCP Server
Version 0.2.0 - Enhanced with prompts, resources, and comprehensive security assessment tools
A comprehensive MCP server for scanning and analyzing MESH by Viscount systems for default credential vulnerabilities. This tool is designed for security research and educational purposes only.
🚨 Important Notice
This tool is for educational and security research purposes only. Unauthorized access to systems is illegal. Always obtain proper authorization before scanning any systems.
Features
🔍 Scanning Capabilities
- Single IP Scanning: Scan individual IP addresses for MESH systems
- IP Range Scanning: Scan entire IP ranges with configurable concurrency
- Default Credential Testing: Test for the default credentials (freedom:viscount)
- System Discovery: Identify MESH by Viscount systems on networks
📊 Security Assessment
- Comprehensive Reports: Generate detailed security assessment reports
- Vulnerability Summaries: Track vulnerabilities across timeframes
- Compliance Reports: Generate reports for NIST, ISO27001, SOC2, and PCI-DSS
- Risk Analysis: Automatic risk level assessment (LOW, MEDIUM, HIGH, CRITICAL)
📋 Data Export
- Multiple Formats: Export results as JSON, CSV, or XML
- Filtered Export: Export only vulnerable systems or specific scans
- Historical Data: Maintain scan history and statistics
🎯 Advanced Features
- System Information: Extract building details, user lists, and event logs
- Entrance Control: Demonstrate entrance unlocking (educational only)
- Real-time Monitoring: Track scanning progress and results
- Rate Limiting: Configurable rate limiting for responsible scanning
Installation
# Install dependencies
npm install
# Build the server
npm run build
# Run the server
npm start
MCP Configuration
Add to your MCP configuration file:
{
"mcpServers": {
"mesh-scanner": {
"command": "node",
"args": ["path/to/mesh-scanner/build/index.js"]
}
}
}
Usage
Basic Scanning
Scan a Single IP
{
"tool": "scan_ip",
"arguments": {
"ipAddress": "192.168.1.100"
}
}
Scan an IP Range
{
"tool": "scan_ip_range",
"arguments": {
"startIp": "192.168.1.1",
"endIp": "192.168.1.254",
"concurrency": 5,
"timeout": 5000
}
}
Security Assessment
Generate Security Report
{
"prompt": "security_assessment",
"arguments": {
"format": "detailed",
"scan_id": "scan_123456789"
}
}
Vulnerability Summary
{
"prompt": "vulnerability_summary",
"arguments": {
"timeframe": "7d"
}
}
Compliance Report
{
"prompt": "compliance_report",
"arguments": {
"standard": "NIST"
}
}
Remediation Guide
{
"prompt": "remediation_guide",
"arguments": {
"system_ip": "192.168.1.100",
"severity": "high"
}
}
Data Export
Export All Results
{
"tool": "export_scan_results",
"arguments": {
"format": "json"
}
}
Export Vulnerable Systems Only
{
"tool": "export_scan_results",
"arguments": {
"format": "csv",
"includeVulnerableOnly": true
}
}
System Information
Get System Details
{
"tool": "get_system_info",
"arguments": {
"url": "http://192.168.1.100"
}
}
Resources
Access real-time data through MCP resources:
mesh://scan-results
- Latest scan resultsmesh://vulnerable-systems
- List of vulnerable systemsmesh://scan-history
- Historical scan datamesh://vulnerability-stats
- Statistics and trendsmesh://system-details
- Detailed system informationmesh://security-assessments
- Generated assessments
Prompts
The server provides several prompts for comprehensive security analysis:
1. Security Assessment
Generates detailed security reports with risk analysis and recommendations.
Arguments:
scan_id
(optional): Specific scan to analyzeformat
: "detailed", "summary", or "executive"
2. Vulnerability Summary
Creates summaries of vulnerabilities found across different timeframes.
Arguments:
timeframe
: "24h", "7d", "30d", or "all"
3. Remediation Guide
Provides specific remediation steps for vulnerable systems.
Arguments:
system_ip
: IP address of vulnerable systemseverity
: "low", "medium", "high", or "critical"
4. Compliance Report
Generates compliance reports for various security standards.
Arguments:
standard
: "NIST", "ISO27001", "SOC2", or "PCI-DSS"
Tools
scan_ip
Scan a single IP address for MESH system and test default credentials.
Parameters:
ipAddress
(string): IP address to scantimeout
(number, optional): Timeout in millisecondsconfig
(object, optional): Additional configuration
scan_ip_range
Scan a range of IP addresses for MESH systems.
Parameters:
startIp
(string): Starting IP addressendIp
(string): Ending IP addressconcurrency
(number, optional): Concurrent scans (max: 20)timeout
(number, optional): Timeout in millisecondsconfig
(object, optional): Additional configuration
test_default_credentials
Test if a MESH system is vulnerable to default credentials.
Parameters:
url
(string): URL of the MESH systemconfig
(object, optional): Additional configuration
get_system_info
Get detailed information about a vulnerable MESH system.
Parameters:
url
(string): URL of the vulnerable systemconfig
(object, optional): Additional configuration
unlock_entrance
Unlock an entrance (educational purposes only).
Parameters:
url
(string): URL of the vulnerable systementranceId
(string): ID of the entrance to unlockconfig
(object, optional): Additional configuration
export_scan_results
Export scan results to various formats.
Parameters:
format
(string): "json", "csv", or "xml"includeVulnerableOnly
(boolean, optional): Export only vulnerable systemsscanId
(string, optional): Specific scan ID to export
Configuration
Scan Configuration
interface ScanConfig {
timeout: number; // Request timeout in ms (default: 5000)
concurrency: number; // Concurrent scans (default: 5, max: 20)
rateLimit: number; // Rate limit between requests (default: 100)
userAgent: string; // Custom User-Agent string
}
Default Credentials
- Username: freedom
- Password: viscount
Security Considerations
Risk Levels
- CRITICAL: >50% of systems vulnerable
- HIGH: >20% of systems vulnerable
- MEDIUM: >10% of systems vulnerable
- LOW: ≤10% of systems vulnerable
Recommendations
- Immediate: Change default credentials on all vulnerable systems
- Short-term: Implement network segmentation and monitoring
- Long-term: Establish regular security assessments and training
Legal and Ethical Use
This tool is provided for:
- Security research and education
- Authorized penetration testing
- Vulnerability assessment with proper authorization
- Security awareness training
Users are responsible for ensuring they have proper authorization before scanning any systems.
Contributing
- Fork the repository
- Create a feature branch
- Make your changes
- Add tests if applicable
- Submit a pull request
License
This project is provided for educational purposes. Use responsibly and in accordance with applicable laws and regulations.
Support
For issues, questions, or contributions, please open an issue on the GitHub repository.