Pentest Tools

Published on January 31st, 2015 📆 | 2877 Views ⚑

0

Nscan: Fast Internet Wide Scanner


iSpeech
Nscan is a fast Network scanner optimized for internet-wide scanning purposes and inspired by Masscan and Zmap. It has it's own tiny TCP/IP stack and uses Raw sockets to send TCP SYN probes. It doesn't need to set SYN Cookies so it doesn't wastes time checking if a received packet is a result of it's own scan, that makes Nscan faster than other similar scanners.
Nscan has a cool feature that allows you to extend your scan by chaining found ip:port to another scripts where they might check for vulnerabilities, exploit targets, look for Proxies/VPNs...

[adsense size='1']

Getting Nscan to Work

Installing Nscan on Debian/Ubuntu boxes:

1
2
3
$ git clone https://github.com/OffensivePython/Nscan
$ cd Nscan/nscan
$ chmod +x nscan.py

Check if Nscan executes:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
$ ./nscan.py
Usage:
nscan.py x.x.x.x/x [options]
nscan.py iface load/unload : Load/Unload Nscan alias interface
nscan.py resume filename.conf: resume previous scan
Options:
  -h, --help            show this help message and exit
  -p PORTS, --port=PORTS
                        Port(s) number (e.g. -p21-25,80)
  -t THREADS, --threads=THREADS
                        Threads used to send packets (default=1)
  --import=IMPORTS      Nscan scripts to import (e.g.
                        --import=ssh_key:22+check_proxy:80-85,8080)
  -b, --banner          Fetch banners
  -n COUNT              Number of results to get
  -o FILE, --output=FILE
                        Output file
  -c N,T, --cooldown=N,T
                        Every N (int) packets sent sleep P (float)
                        (Default=1000,1)

Usage

Nscan is simple to use, it works just the way you expect.
If this your first run, you need to load nscan alias interface before launching a Scan





1
2
3
4
5
6
$ ./nscan.py iface load
Press enter key to load nscan alias interface
[....] Running /etc/init.d/networking restart is deprecated because it may not [warnable some interfaces ... (warning).
[ ok ] Reconfiguring network interfaces...done.
Nscan alias interface loaded: 10.0.2.16

Simple Scan

To scan your local network for port 22,80:

1
2
3
4
5
6
7
8
9
10
11
12
13
$ ./nscan.py 192.168.0.0/16 -p22,80
    _   __                   
   / | / /_____________ _____
  /  |/ / ___/ ___/ __ `/ __ \
 / /|  (__  ) /__/ /_/ / / / /
/_/ |_/____/\___/\__,_/_/ /_/
@OffensivePython             1.0
URL: https://github.com/OffensivePython/Nscan
Scanning [192.168.0.0 -> 192.169.0.0] (65536 hosts/2 ports)
[MAIN] Starting the scan (Fri Jan 30 07:11:02 2015)
...

This scans the 65536 hosts in your local network

 

Here is repository: https://github.com/OffensivePython/Nscan

Tagged with:



Comments are closed.