Rust command line utility for quick asynchronous network hosts scanning.
NOTE: in order to use the tool you may need to increase the maximum allowed open files. E.g.:
bash
ulimit -n 10000
NOTE: for the ping scan mode, you need
root
or other proper permissions (i.e. CAPNETRAW).
See the CLI tool on crates.io.
qsc
Clone the repository and build qsc
with:
```bash git clone https://github.com/0xor0ne/qscan cd qscan cargo build --release -p qsc
cargo install --path qsc ```
If not installed, qsc
executable can be found in ./target/release/qsc
.
Alternatively, it is possible to install from crates.io:
bash
cargo install qsc
Print the help message using -h
option:
```bash
qsc -h qsc 0.4.0 0xor0ne Quick async network scanner CLI
USAGE:
qsc [OPTIONS] --targets
OPTIONS:
--batch
-h, --help
Print help information
--json <JSON>
Path to file whre to save results in json format
--mode <MODE>
Scan mode:
- 0: TCP connect;
- 1: ping (--ports is ognored);
- 2: ping and then TCP connect using as targets the nodes that replied to the ping;
[default: 0]
--ping-interval <PING_INTERVAL>
Inteval in ms between pings for a single target. [default: 1000]
--ping-tries <PING_TRIES>
Number of maximum retries for each target (ping scan) [default: 1]
--ports <PORTS>
Comma separate list of ports (or port ranges) to scan for each target. E.g., '80',
'22,443', '1-1024,8080'
--printlevel <PRINTLEVEL>
Console output mode:
- 0: suppress console output;
- 1: print ip:port for open ports at the end of the scan;
- 2: print ip:port:<OPEN|CLOSE> at the end of the scan;
- 3: print ip:port for open ports as soon as they are found;
- 4: print ip:port:<OPEN:CLOSE> as soon as the scan for a
target ends;
[default: 3]
--targets <TARGETS>
Comma separated list of targets to scan. A target can be an IP, a set of IPs in CIDR
notation, a domain name or a path to a file containing one of the previous for each
line. E.g., '8.8.8.8', '192.168.1.0/24', 'www.google.com,/tmp/ips.txt'
--tcp-tries <TCP_TRIES>
Number of maximum retries for each target:port pair (TCP Connect scan) [default: 1]
--timeout <TIMEOUT>
Timeout in ms. If the timeout expires the port is considered close [default: 1500]
-V, --version
Print version information
```
here are a few usage examples:
```bash
qsc --targets "8.8.8.8" --ports "1-1000"
qsc --targets "192.168.1.0/24" --ports "22" --timeout 500
qsc --targets "www.google.com" --ports "80,443"
qsc --targets "/tmp/ips.txt" --ports "1-1024"
qsc --targets "8.8.8.8" --ports 80,443,111 --tcp-tries 1 --json /tmp/xxx.json --printlevel 4
sudo qsc --targets "8.8.8.8,1.2.3.4" --ports "" --mode 1 --ping-tries 3 --timeout 1000 --ping-interval 1000 --printlevel 4
sudo qsc --targets "192.168.1.0/24" --ports "22,80,443" --mode 2 --ping-tries 1 --timeout 1000 --ping-interval 1000 --printlevel 4 --json /tmp/res.json ```
It's possible to build and use a Docker image configured for running qsc
.
Assuming Docker is installed on your machine and configured to run without sudo (if not, see here and here), proceed by building the image:
bash
./qsc/scripts/docker_build.sh
Then you can use the 0xor0ne/qscan
Docker image for running the scanner:
bash
docker run --rm -it 0xor0ne/qscan --targets "8.8.8.8" --ports "1-1024"
the same thing can be done using the helper script:
bash
./qsc/scripts/docker_run_scan.sh --targets "8.8.8.8" --ports "1-1024"
Alternatively, it is possible to download and run a precompiled image from hub.docker.com:
bash
docker run --rm 0xor0ne/qscan:latest --targets "8.8.8.8" --ports "1-1024"