-
-
Notifications
You must be signed in to change notification settings - Fork 1k
Things you may want to do with RustScan but don't understand how
Bee edited this page Nov 5, 2020
·
4 revisions
Here are some things you may want to do with RustScan!
You can scan multiple IPs using a comma separated list like so:
rustscan -a 127.0.0.1,0.0.0.0
RustScan can also scan hosts, like so:
β rustscan -a www.google.com, 127.0.0.1
Open 216.58.210.36:1
Open 216.58.210.36:80
Open 216.58.210.36:443
Open 127.0.0.1:53
Open 127.0.0.1:631
RustScan supports CIDR:
β rustscan -a 192.168.0.0/30
The file is a new line separated list of IPs / Hosts to scan:
hosts.txt
192.168.0.1
192.168.0.2
google.com
192.168.0.0/30
127.0.0.1
The argument is:
rustscan -a 'hosts.txt'
RustScan can scan individual ports, like so:
β rustscan -a 127.0.0.1 -p 53
53
You can input a comma separated list of ports to scan:
β rustscan -a 127.0.0.1 -p 53,80,121,65535
53
To scan a range of ports:
To run:
β rustscan -a 127.0.0.1 --range 1-1000
53,631
RustScan, at the moment, runs Nmap by default.
You can adjust the arguments like so:
rustscan -a 127.0.0.1 -- -A -sC
To run:
nmap -Pn -vvv -p $PORTS -A -sC 127.0.0.1
If you want to scan ports in a random order (which will help with not setting off firewalls) run RustScan like this:
β rustscan -a 127.0.0.1 --range 1-1000 --scan-order "Random"
53,631