Exports scan results and security assessment data in XML format for integration with various security and reporting systems.
MESH by Viscount Vulnerability Scanner MCP Server
Version 0.2.0 - Enhanced with prompts, resources, and comprehensive security assessment tools
A comprehensive MCP server for scanning and analyzing MESH by Viscount systems for default credential vulnerabilities. This tool is designed for security research and educational purposes only.
🚨 Important Notice
This tool is for educational and security research purposes only. Unauthorized access to systems is illegal. Always obtain proper authorization before scanning any systems.
Features
🔍 Scanning Capabilities
Single IP Scanning: Scan individual IP addresses for MESH systems
IP Range Scanning: Scan entire IP ranges with configurable concurrency
Default Credential Testing: Test for the default credentials (freedom:viscount)
System Discovery: Identify MESH by Viscount systems on networks
📊 Security Assessment
Comprehensive Reports: Generate detailed security assessment reports
Vulnerability Summaries: Track vulnerabilities across timeframes
Compliance Reports: Generate reports for NIST, ISO27001, SOC2, and PCI-DSS
Risk Analysis: Automatic risk level assessment (LOW, MEDIUM, HIGH, CRITICAL)
📋 Data Export
Multiple Formats: Export results as JSON, CSV, or XML
Filtered Export: Export only vulnerable systems or specific scans
Historical Data: Maintain scan history and statistics
🎯 Advanced Features
System Information: Extract building details, user lists, and event logs
Entrance Control: Demonstrate entrance unlocking (educational only)
Real-time Monitoring: Track scanning progress and results
Rate Limiting: Configurable rate limiting for responsible scanning
Installation
MCP Configuration
Add to your MCP configuration file:
Usage
Basic Scanning
Scan a Single IP
Scan an IP Range
Security Assessment
Generate Security Report
Vulnerability Summary
Compliance Report
Remediation Guide
Data Export
Export All Results
Export Vulnerable Systems Only
System Information
Get System Details
Resources
Access real-time data through MCP resources:
mesh://scan-results- Latest scan resultsmesh://vulnerable-systems- List of vulnerable systemsmesh://scan-history- Historical scan datamesh://vulnerability-stats- Statistics and trendsmesh://system-details- Detailed system informationmesh://security-assessments- Generated assessments
Prompts
The server provides several prompts for comprehensive security analysis:
1. Security Assessment
Generates detailed security reports with risk analysis and recommendations.
Arguments:
scan_id(optional): Specific scan to analyzeformat: "detailed", "summary", or "executive"
2. Vulnerability Summary
Creates summaries of vulnerabilities found across different timeframes.
Arguments:
timeframe: "24h", "7d", "30d", or "all"
3. Remediation Guide
Provides specific remediation steps for vulnerable systems.
Arguments:
system_ip: IP address of vulnerable systemseverity: "low", "medium", "high", or "critical"
4. Compliance Report
Generates compliance reports for various security standards.
Arguments:
standard: "NIST", "ISO27001", "SOC2", or "PCI-DSS"
Tools
scan_ip
Scan a single IP address for MESH system and test default credentials.
Parameters:
ipAddress(string): IP address to scantimeout(number, optional): Timeout in millisecondsconfig(object, optional): Additional configuration
scan_ip_range
Scan a range of IP addresses for MESH systems.
Parameters:
startIp(string): Starting IP addressendIp(string): Ending IP addressconcurrency(number, optional): Concurrent scans (max: 20)timeout(number, optional): Timeout in millisecondsconfig(object, optional): Additional configuration
test_default_credentials
Test if a MESH system is vulnerable to default credentials.
Parameters:
url(string): URL of the MESH systemconfig(object, optional): Additional configuration
get_system_info
Get detailed information about a vulnerable MESH system.
Parameters:
url(string): URL of the vulnerable systemconfig(object, optional): Additional configuration
unlock_entrance
Unlock an entrance (educational purposes only).
Parameters:
url(string): URL of the vulnerable systementranceId(string): ID of the entrance to unlockconfig(object, optional): Additional configuration
export_scan_results
Export scan results to various formats.
Parameters:
format(string): "json", "csv", or "xml"includeVulnerableOnly(boolean, optional): Export only vulnerable systemsscanId(string, optional): Specific scan ID to export
Configuration
Scan Configuration
Default Credentials
Username: freedom
Password: viscount
Security Considerations
Risk Levels
CRITICAL: >50% of systems vulnerable
HIGH: >20% of systems vulnerable
MEDIUM: >10% of systems vulnerable
LOW: ≤10% of systems vulnerable
Recommendations
Immediate: Change default credentials on all vulnerable systems
Short-term: Implement network segmentation and monitoring
Long-term: Establish regular security assessments and training
Legal and Ethical Use
This tool is provided for:
Security research and education
Authorized penetration testing
Vulnerability assessment with proper authorization
Security awareness training
Users are responsible for ensuring they have proper authorization before scanning any systems.
Contributing
Fork the repository
Create a feature branch
Make your changes
Add tests if applicable
Submit a pull request
License
This project is provided for educational purposes. Use responsibly and in accordance with applicable laws and regulations.
Support
For issues, questions, or contributions, please open an issue on the GitHub repository.
This server cannot be installed