scanssh man page on DragonFly

Man page or keyword search:  
man Server   44335 pages
apropos Keyword Search (all sections)
Output format
DragonFly logo
[printable version]

scanssh(1)		  BSD General Commands Manual		    scanssh(1)

NAME
     scanssh — scans the Internet for open proxies and SSH servers

SYNOPSIS
     scanssh [-VIERph] [-s scanners,...] [-n ports,...] [-u socks hosts,...]
	     [-e excludefile] addresses...

DESCRIPTION
     ScanSSH scans the given addresses and networks for running services.  It
     mainly allows the detection of open proxies and Internet services.	 For
     known services, ScanSSH will query their version number and displays the
     results in a list.

     The adresses can be either specified as an IPv4 address or an CIDR like
     IP prefix, ipaddress/masklength.  Ports can be appended by adding a colon
     at the end of address specification.

     Additionally, the following two commands can be prefixed to the address:

     random(n[,seed])/	The random command selects random address from the
			address range specified.  The arguments are as fol‐
			lows: n is the number of address to randomly create in
			the given network and seed is a seed for the pseudo
			random number generator.

     split(s,e)/	The split command is used to split the address range
			in several unique components.  This can be use to scan
			from serveral hosts in parallel.  The arguments are as
			follows: e specifies the number of hosts scanning in
			parallel and s is the number of the host this particu‐
			lar scan runs on.

     The options are as follows:

     -V		     Causes scanssh to print its version number.

     -I		     Does not send a SSH identification string.

     -E		     Exit the program, if the file containing the addresses
		     for exclusion can not be found.

     -R		     If addresses are generated at random, this flag causes
		     the program to ignore excluded addresses from the exclude
		     file.  The default behaviour is to always exclude
		     addresses.

     -p		     Specifies that ScanSSH should operate as a proxy detec‐
		     tor.  This flag sets the default modes and default scan‐
		     ners to detect open proxies.

     -h		     Displays the usage of the program.

     -n ports,...    Specifies the port numbers to scan.  Ports are separated
		     by commas.	 Each specified scanner is run for each port
		     in this list.  The default is 22.

     -u socks hosts,...
		     A list of comma separated host:port pairs of SOCKS prox‐
		     ies that scanssh should use to scan through.

     -s scanners     Specifies a number of scanners should be executed for
		     each open port.  Multiple scanners are separated by com‐
		     mas.  The following scanners are currently supported:

		     ssh	    Finds versions for SSH, Web and SMTP
				    servers.

		     socks5	    Detects if a SOCKS V5 proxy is running on
				    the port.

		     socks4	    Detects if a SOCKS V4 proxy is running on
				    the port.

		     http-proxy	    Detects a HTTP get proxy.

		     http-connect   Detects a HTTP connect proxy.

		     telnet-proxy   Detects telnet based proxy servers.

     -e excludefile  Specifies the file that contains the addresses to be
		     excluded from the scan.  The syntax is the same as for
		     the addresses on the command line.

     The output from scanssh contains only IP addresses.  However, the IP
     addresses can be converted to names with the logresolve(8) tool included
     in the Apache webserver.

EXAMPLES
     The following command scans the class C network 10.0.0.0 - 10.0.0.255 for
     open proxies:

     scanssh -p 10.0.0.0/24

     The next command scans for ssh servers on port 22 only:

     scanssh -n 22 -s ssh 192.168.0.0/16

     The following command can be used in a parallel scan.  Two hosts scan the
     specified networks randomly, where this is the first host:

     scanssh 'random(0,rsd)/split(1,2)/(192.168.0.0/16 10.1.0.0/24):22,80'

BUGS
     At the moment, scanssh leaves a one line entry in the log file of the ssh
     server.  It is probably not possible to avoid that.

BSD				 July 17, 2000				   BSD
[top]

List of man pages available for DragonFly

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net