- Introduction
- Technical Description
- Technologies Used
- Main Features
- Installation
- Usage Examples
- Possible Improvements
The Network Scanner Tool is a powerful command-line network reconnaissance application built using Scapy. It provides a flexible and efficient method for scanning network ports, helping network administrators and security professionals identify open ports and potential vulnerabilities.
The tool implements a TCP port scanning mechanism with advanced features:
- SYN Scanning: Uses half-open TCP scanning technique
- Progress Visualization: Integrated progress bar with colorful output
- Flexible Port Scanning:
- Scan specific ports
- Scan port ranges
- Detailed error handling
Key Technical Components:
# Packet crafting example
tcp_packet = IP(dst=target) / TCP(dport=port, flags="S")
response = sr1(tcp_packet, timeout=1, verbose=False)
- Python 3.x
- Network programming
- Command-line argument parsing
- Scapy
- Packet manipulation
- Network scanning
- Additional Libraries
tqdm
: Progress bar visualizationcolorama
: Colored console outputargparse
: Command-line argument handling
- TCP Port Scanning
- SYN half-open scanning technique
- Supports single port and port range scanning
- User-Friendly Interface
- Colorful console output
- Progress bar during scanning
- Clear result presentation
- Flexible Scanning Options
- Specify target IP/hostname
- Scan multiple or range of ports
-
Prerequisites:
- Python 3.7+
- Root/Administrator privileges
-
Required Libraries:
pip install scapy tqdm colorama
-
Clone Repository:
git clone https://github.com/RobCyberLab/Network-Scanner-Tool.git cd network-scanner-tool
Scan Specific Ports:
python scanner.py TCP 192.168.1.1 22 80 443
Scan Port Range:
python scanner.py TCP 192.168.1.1 0 1000 --range
- Additional Scan Types
- UDP scanning
- XMAS scan
- FIN scan
- Enhanced Reporting
- JSON/CSV output
- Detailed port service detection
- Performance Optimization
- Parallel scanning
- Adaptive timing strategies
- Advanced Features
- OS fingerprinting
- Banner grabbing
- Stealth scanning techniques
🚨 Important:
- Use only on networks you own or have explicit permission to scan
- Unauthorized network scanning may be illegal
- Respect privacy and network usage policies