Penetration Testing mailing list archives
Re: Scanning Class A network
From: Chris Byrd <cbyrd01 () gmail com>
Date: Mon, 24 Oct 2005 13:46:04 -0500
What you probably want is scanrand, a component of Paketto Keiretsu (http://www.doxpara.com). Scanrand is a stateless TCP scanner that splits the functions of sending probes and receiving replies using a technique the author calls SYN cookies to verify the results. By doing this, it can scan with incredibly fast (nearly wirespeed at 10Mb) results. I've used it to scan class C networks in seconds. You can then feed the results to a more feature-complete scanner like nmap for service and host identification, etc. Best of luck to you. - Chris On 24 Oct 2005 12:33:05 -0000, tarunthenut () gmail com <tarunthenut () gmail com> wrote:
Hello All, Recently I was given a task to carry out a port scan of an entire valid Class A range (Dont ask me what the huge pool of valid IP's was for :) ). The scan needed to be carried out externally, and not from within the network to identify hosts and ports exposed to the Internet. The problem compounded cause of the following limitations : 1. ICMP was not allowed in the network 2. The IP range was to be scanned every month for the entire port range fro= m 1-65535 for TCP & UDP After searching for a suitable scanner which could scan such a large range in reasonable time, I could think of only nmap, nessus, superscan and ISS. But because of the limitations stated above,all the tools took a huge amount of time (ran into month). I have struggled with options within the tools, tried configurable parameters (host time out, parallelism, RTT etc) and divided into smaller class C networks and scanned.but still the scan seems to take ages even if it is Any advise would be welcome :) Cheers tarunthenut ------------------------------------------------------------------------------ Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 -------------------------------------------------------------------------------
------------------------------------------------------------------------------ Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 -------------------------------------------------------------------------------
Current thread:
- Scanning Class A network tarunthenut (Oct 24)
- Re: Scanning Class A network Kurt (Oct 24)
- Re: Scanning Class A network David Eduardo Acosta RodrÃguez (Oct 24)
- Re: Scanning Class A network robert (Oct 24)
- Re: Scanning Class A network Mike Jones (Oct 24)
- Re: Scanning Class A network Justin (Oct 24)
- Re: Scanning Class A network Chris Byrd (Oct 24)
- Re: Scanning Class A network Matt Bellizzi (Oct 24)
- RE: Scanning Class A network Kyle Starkey (Oct 24)
- Re: Scanning Class A network Satanic.Brain (Oct 24)
- Re: Scanning Class A network R. DuFresne (Oct 24)
- Re: Scanning Class A network Steve Micallef (Oct 24)
- Re: Scanning Class A network Volker Tanger (Oct 24)
- RE: Scanning Class A network Talisker (Oct 25)
- Re: Scanning Class A network Adam Jones (Oct 26)
- RE: Scanning Class A network Brian Loe (Oct 26)
- <Possible follow-ups>
- Re: Scanning Class A network barcajax (Oct 24)
(Thread continues...)