Nscan: Fast Internet Wide Scanner
iSpeech
Nscan is a fast Network scanner optimized for internet-wide scanning purposes and inspired by Masscan and Zmap. It has it's own tiny TCP/IP stack and uses Raw sockets to send TCP SYN probes. It doesn't need to set SYN Cookies so it doesn't wastes time checking if a received packet is a result of it's own scan, that makes Nscan faster than other similar scanners.
Nscan has a cool feature that allows you to extend your scan by chaining found ip:port to another scripts where they might check for vulnerabilities, exploit targets, look for Proxies/VPNs...
[adsense size='1']
Getting Nscan to Work
Installing Nscan on Debian/Ubuntu boxes:
1
2
3
|
$ git clone https: //github .com /OffensivePython/Nscan $ cd Nscan /nscan $ chmod +x nscan.py |
Check if Nscan executes:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
|
$ . /nscan .py Usage: nscan.py x.x.x.x /x [options] nscan.py iface load /unload : Load /Unload Nscan alias interface nscan.py resume filename.conf: resume previous scan Options: -h, --help show this help message and exit -p PORTS, --port=PORTS Port(s) number (e.g. -p21-25,80) -t THREADS, --threads=THREADS Threads used to send packets (default=1) -- import =IMPORTS Nscan scripts to import (e.g. -- import =ssh_key:22+check_proxy:80-85,8080) -b, --banner Fetch banners -n COUNT Number of results to get -o FILE, --output=FILE Output file -c N,T, --cooldown=N,T Every N (int) packets sent sleep P (float) (Default=1000,1) |
Usage
Nscan is simple to use, it works just the way you expect.
If this your first run, you need to load nscan alias interface before launching a Scan
1
2
3
4
5
6
|
$ . /nscan .py iface load Press enter key to load nscan alias interface [....] Running /etc/init .d /networking restart is deprecated because it may not [warnable some interfaces ... (warning). [ ok ] Reconfiguring network interfaces... done . Nscan alias interface loaded: 10.0.2.16 |
Simple Scan
To scan your local network for port 22,80:
1
2
3
4
5
6
7
8
9
10
11
12
13
|
$ . /nscan .py 192.168.0.0 /16 -p22,80 _ __ / | / /_____________ _____ / |/ / ___/ ___/ __ `/ __ \ / /| (__ ) /__/ /_/ / / / / /_/ |_ /____/ \___/\__,_ /_/ /_/ @OffensivePython 1.0 URL: https: //github .com /OffensivePython/Nscan Scanning [192.168.0.0 -> 192.169.0.0] (65536 hosts /2 ports) [MAIN] Starting the scan (Fri Jan 30 07:11:02 2015) ... |
This scans the 65536 hosts in your local network
Here is repository: https://github.com/OffensivePython/Nscan
Gloss