RustScan
Last updated
Last updated
Room Link:
The tool is really amazing in terms of scanning. It can scan all the ports really fast and then pipe the output to the Nmap. Now in this room, we'll scan our vulnerable machine. Basic format for RustScan is rustscan -r ports -a <Target-ip> -- <nmap cmds> Here's a full list of things you can do.
You can scan multiple IPs using a comma-separated list like so:
RustScan can also scan hosts, like so:
RustScan supports CIDR:
The file is a new line separated list of IPs / Hosts to scan:
hosts.txt
The argument is:
RustScan can scan individual ports, like so:
You can input a comma-separated list of ports to scan:
To scan a range of ports:
To run:
RustScan, at the moment, runs Nmap by default.
You can adjust the arguments like so:
To run:
If you want to scan ports in a random order (which will help with not setting off firewalls) run RustScan like this:
After scanning this, how many ports do we find open under 1000?
Kali
Perform a service version detection scan, what is the version of the software running on port 22?
Kali
Perform an aggressive scan, what flag isn't set under the results for port 80?
Kali