Cross-platform network scan tool for host and service discovery. Written in Rust.
Aim to be simple and fast.
``` USAGE: nscan [FLAGS] [OPTIONS]
FLAGS: -d, --detail Get details (service version and OS) -A, --acceptinvalidcerts Accept invalid certs (This introduces significant vulnerabilities) -h, --help Prints help information -V, --version Prints version information
OPTIONS:
-p, --port
Port scan and service version detection
If you omit the port specification, use nscan-default-ports
```
shellrow@MacBook-Pro nscan % sudo nscan -p 192.168.1.8 -d
nscan 0.4.0 macos
https://github.com/shellrow/nscan
Scan started at 2021-05-04 23:58:40.139326
----Port Scan Options------------------------------------------- IP Address: 192.168.1.8 Port List: nscan-default-ports (1005 ports)
Scanning ports... Done Detecting service version... Done
----Scan Reports------------------------------------------------ 3 open port(s) / scanned 1005 port(s) PORT SERVICE 22 ssh SSH-2.0-OpenSSH_7.9p1 Raspbian-10+deb10u2 80 http Server: Apache/2.4.38 (Raspbian) 5900 rfb
Scan Time: 1.732023441s (Including 100ms of wait time) ```
Host scan
```
shellrow@MacBook-Pro nscan % sudo nscan -n 192.168.1.0
nscan 0.4.0 macos
https://github.com/shellrow/nscan
Scan started at 2021-05-04 23:58:12.324610
----Host Scan Options-------------------------------------------
Scanning... Done
----Scan Reports------------------------------------------------ 5 host(s) up / 254 IP address(es) IP ADDR MAC ADDR 192.168.1.1 00:80:87:77:a1:b1 OkiElect 192.168.1.4 27:8c:fd:b7:a2:b2 Own device 192.168.1.8 b8:27:eb:f1:a3:b3 Raspberr 192.168.1.16 30:9c:23:d6:a4:b4 Micro-St
Scan Time: 543.253681ms (Including 100ms of wait time) ```
Please check my repository for detail
-A(--acceptinvalidcerts)
flag allow you to trust invalid certificates and attempt TLS connection.
This flag should not be used unless you are explicitly aware of it, such as when the service you are managing uses self-signed certificate.
This tool is intended for network analysis.