


This can be done with the -exclude option. Sometimes you need to exclude some ip addresses and subnets from scanning.

This can be done with the -rate option.įor example, to limit the speed to 1 packet per 5 seconds:Ĭat arp.cache | sx tcp –rate 1/5s –json -p 22,80,443 192.168.0.171 Sometimes you need to limit the speed at which generated packets are sent. In this case we find out that host sent ICMP reply packet with Destination Unreachable type and Port Unreachable code (typical response for a closed port according to the rfc1122).įirewalls typically set ICMP code distinct from Port Unreachanble and so can be easily detected. Here’s a quick examples showing how you can scan networks with sx. libpcap (already installed if you use wireshark).The simplest way is to download from GitHub Releases and place the executable file in your PATH. JSON output support: sx is designed specifically for convenient automatic processing of results.Randomized iteration over IP addresses using finite cyclic multiplicative groups.Elasticsearch scan: Detect open Elasticsearch nodes and pull out cluster information with all index names.Docker scan: Detect open Docker daemons listening on TCP ports and get information about the docker node.SOCKS5 scan: Detect live SOCKS5 proxies by scanning ip range or list of ip/port pairs from a file.UDP scan: Scan UDP ports and get full ICMP replies to detect open ports or firewall rules.Custom TCP scans with any TCP flags: Send whatever exotic packets you want and get a result with all the TCP flags set in the reply packet.TCP FIN / NULL / Xmas scans: Scan techniques to bypass some firewall rules.TCP SYN scan: Traditional half-open scan to find open TCP ports.ICMP scan: Use advanced ICMP scanning techniques to detect live hosts and firewall rules.ARP scan: Scan your local networks to detect live devices.The goal of this project is to create the fastest network scanner with clean and simple code. Sx is the command-line network scanner designed to follow the UNIX philosophy.
