Penetration Testing mailing list archives

Re: Re: scanrand ver 2


From: anonymous1 () anonymous com
Date: 6 Oct 2005 13:20:23 -0000

I'm actively using paketto/scanrand 1.10 as a >>very fast vanilla-bruteforce-scanner for >>scanning subnets or bigger 
nets quickly. 
Version 1.10 does it's dirty work very fast, >>faster than every other scanner i tried - i >>like this speed and 
wouldn't really expect >>more features.

The thing about this version is that it doesn't have the capacity to do any icmp detection of hosts before it tries to 
scan them, I don't want it to try to scan non existant hosts in a range. I find the "-f" parameter to feed it a target 
list doesn't work either. Another issue I'm having with it is after its finished scanning a host (first host in a 
designated block even) that it doesn't seem to exit one of its functions properly and just sits there doing nothing 
(there's no activity on the wire either). Also the target input variables aren't anywhere near as good as they are in 
nmap.

I am using this emerged from gentoo, so it may be something specific to my build.


Has a lot of NMAP like code in it, almost like >>it copied and 
pasted from nmap to scanrand for the port >>scanning, but what do I know.. :)

Which parts would those be? They HMAC/SHA1 stamped packets for return authenticity or the fact that it segregates 
sending/recieving of packets into two different processes? :D


------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: 

Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are 
futile against web application hacking. Check your website for vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers do! 
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


Current thread: