RustScan

Room Link: https://tryhackme.com/r/room/rustscan

Scanning Time!

The tool is really amazing in terms of scanning. It can scan all the ports really fast and then pipe the output to the Nmap. Now in this room, we'll scan our vulnerable machine. Basic format for RustScan is rustscan -r ports -a <Target-ip> -- <nmap cmds> Here's a full list of things you can do.

Multiple IP Scanning

You can scan multiple IPs using a comma-separated list like so:

rustscan -a 127.0.0.1,0.0.0.0

Host Scanning

RustScan can also scan hosts, like so:

➜ rustscan -a www.google.com, 127.0.0.1
Open 216.58.210.36:1
Open 216.58.210.36:80
Open 216.58.210.36:443
Open 127.0.0.1:53
Open 127.0.0.1:631

CIDR support

RustScan supports CIDR:

Hosts file as input

The file is a new line separated list of IPs / Hosts to scan:

hosts.txt

The argument is:

Individual Port Scanning

RustScan can scan individual ports, like so:

Multiple selected port scanning

You can input a comma-separated list of ports to scan:

Ranges of ports

To scan a range of ports:

To run:

Adjusting the Nmap arguments

RustScan, at the moment, runs Nmap by default.

You can adjust the arguments like so:

To run:

Random Port Ordering

If you want to scan ports in a random order (which will help with not setting off firewalls) run RustScan like this:

Answer the questions

After scanning this, how many ports do we find open under 1000?

Kali

Perform a service version detection scan, what is the version of the software running on port 22?

Kali

Perform an aggressive scan, what flag isn't set under the results for port 80?

Kali

Last updated