unicornscan 收集网络信息

unicornscan 利用引擎相关性(correlation)技术提供准确、灵活、高效率的引擎。它提供用于探测TCP/ip的可用装置和测定网络回应的最佳界面。
主要功能:
异步无状态TCP端口扫描
异步无状态TCP标志(banner)捕获
异步UDP端口扫描
主动、被动远程操作系统以及应用程序识别
PCAP文档记录筛选
输出关系型数据库
支持用户指定模块

    -b, --broken-crc     *set broken crc sums on [T]ransport layer, [N]etwork layer, or both[TN]
    -B, --source-port    *set source port? or whatever the scan module expects as a number
    -c, --proc-duplicates process duplicate replies
    -d, --delay-type     *set delay type (numeric value, valid options are `1:tsc 2:gtod 3:sleep')
    -D, --no-defpayload   no default Payload, only probe known protocols
    -e, --enable-module  *enable modules listed as arguments (output and report currently)
    -E, --proc-errors     for processing `non-open' responses (icmp errors, tcp rsts...)
    -F, --try-frags       
    -G, --payload-group *payload group (numeric) for tcp/udp type payload selection (default all)
    -h, --help            help
    -H, --do-dns          resolve hostnames during the reporting phase
    -i, --interface      *interface name, like eth0 or fxp1, not normally required
    -I, --immediate       immediate mode, display things as we find them
    -j, --ignore-seq     *ignore `A'll, 'R'eset sequence numbers for tcp header validation
    -l, --logfile        *write to this file not my terminal
    -L, --packet-timeout *wait this long for packets to come back (default 7 secs)
    -m, --mode           *scan mode, tcp (syn) scan is default, U for udp T for tcp `sf' for tcp connect scan and A for arp
                           for -mT you can also specify tcp flags following the T like -mTsFpU for example
                           that would send tcp syn packets with (NO Syn|FIN|NO Push|URG)
    -M, --module-dir     *directory modules are found at (defaults to /usr/lib/unicornscan/modules)
    -o, --format         *format of what to display for replies, see man page for format specification
    -p, --ports           global ports to scan, if not specified in target options
    -P, --pcap-filter    *extra pcap filter string for reciever
    -q, --covertness     *covertness value from 0 to 255
    -Q, --quiet           dont use output to screen, its going somewhere else (a database say...)
    -r, --pps            *packets per second (total, not per host, and as you go higher it gets less accurate)
    -R, --repeats        *repeat packet scan N times
    -s, --source-addr    *source address for packets `r' for random
    -S, --no-shuffle      do not shuffle ports
    -t, --ip-ttl         *set TTL on sent packets as in 62 or 6-16 or r64-128
    -T, --ip-tos         *set TOS on sent packets
    -u, --debug     *debug mask
    -U, --no-openclosed  dont say open or closed
    -w, --safefile       *write pcap file of recieved packets
    -W, --fingerprint    *OS fingerprint 0=cisco(def) 1=openbsd 2=WindowsXP 3=p0fsendsyn 4=FreeBSD 5=nmap
                          6=linux 7:strangetcp
    -v, --verbose         verbose (each time more verbose so -vvvvv is really verbose)
    -V, --version         display version
    -z, --sniff           sniff alike
    -Z, --drone-str      *drone String
*:  options with `*' require an argument following them

  address ranges are cidr like 1.2.3.4/8 for all of 1.?.?.?
  if you omit the cidr mask then /32 is implied
  port ranges are like 1-4096 with 53 only scanning one port, a for all 65k and p for 1-1024
example: unicornscan -i eth1 -Ir 160 -E 192.168.1.0/24:1-4000 gateway:a

例如:

unicornscan -r 100000 -m U -Iv 101.5.242.87/24:1-10000
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

蓝鲸123

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值