Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network,
what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping).
Angry IP Scanner (or simply ipscan) is an open-source and cross-platform network scanner designed to be fast and simple to use. It scans IP addresses and ports as well as has many other features.
It is widely used by network administrators and just curious users around the world, including large and small enterprises, banks, and government agencies. It runs on Linux, Windows, and Mac OS X, possibly supporting other platforms as well.
SuperScan 4 is an update of the highly popular Windows port scanning tool, SuperScan.
Windows XP Service Pack 2 has removed raw sockets support which now limits SuperScan
and many other network scanning tools. Some functionality can be restored by running
the following at the Windows command prompt before starting SuperScan:
net stop SharedAccess
Here are some of the new features in this version.
- Superior scanning speed
- Support for unlimited IP ranges
- Improved host detection using multiple ICMP methods
- TCP SYN scanning
- UDP scanning (two methods)
- IP address import supporting ranges and CIDR formats
- Simple HTML report generation
- Source port scanning
- Fast hostname resolving
- Extensive banner grabbing
- Massive built-in port list description database
- IP and port scan order randomization
- A selection of useful tools (ping, traceroute, Whois etc)
- Extensive Windows host enumeration capability
Unicornscan is a new information gathering and correlation engine built for and by members of the security research and testing communities. It was designed to provide an engine that is Scalable, Accurate, Flexible, and Efficient. It is released for the community to use under the terms of the GPL license.
Unicornscan is an attempt at a User-land Distributed TCP/IP stack. It is intended to provide a researcher a superior interface for introducing a stimulus into and measuring a response from a TCP/IP enabled device or network. Although it currently has hundreds of individual features, a main set of abilities include:
- Asynchronous stateless TCP scanning with all variations of TCP Flags.
- Asynchronous stateless TCP banner grabbing
- Asynchronous protocol specific UDP Scanning (sending enough of a signature to elicit a response).
- Active and Passive remote OS, application, and component identification by analyzing responses.
- PCAP file logging and filtering
- Relational database output
- Custom module support
- Customized data-set views
AutoScan-Network is a network scanner (discovering and managing application). No configuration is required to scan your network. The main goal is to print the list of connected equipments in your network.
- Fast network scanner
- Automatic network discovery
- TCP/IP scanner
- Wake on lan functionality
- Multi-threaded Scanner
- Port scanner
- Low surcharge on the network
- VNC Client
- Telnet Client
- SNMP scanner
- Simultaneous subnetworks scans without human intervention
- Realtime detection of any connected equipment
- Supervision of any equipment (router, server, firewall…)
- Supervision of any network service (smtp, http, pop, …)
- Automatic detection of known operatic system (brand and version), you can also add any unknown equipment to the database
- The graphical interface can connect one or more scanner agents (local or remote)
- Scanner agents could be deployed all over the network to scan through any type of equipment (router, NAT, etc)
- Network Intruders detection (in intruders detection mode, all new equipments blacklisted)
- Complete network tree can be saved in a XML file.
- Privileged account is not required