Using Unicorn-Scan
Unicorn-Scan is another port scanning tool. It creates a chrooted environment (userland) to protect you from the possibly hostile network you are scanning. It can be used from the command line, or from a PostgreSQL-powered frontend. We will show you the command-line version here. The following chart is a concordance from Nmap users from the documentation on the Unicorn-Scan project website:
A basic connect scan to find all open ports in a range using Unicorn-Scan is unicornscan -i eth0 -Ir 160 -E 10.0.0.012/32:20-600
. If we break this up into sections, the command is as follows:
i eth0
: It defines the interface eth0 on the Kali machine-Ir 160
: Its has two options in a group-I
: It is telling Unicorn-Scan to print to screen immediately as open ports are found-r 160
: It is setting the scan rate to 160 ports per second (PPS)
-E 10.0.0.012/32:20-600
: It is the target range- The Classless Inter-Domain Routing (CIDR) code shows a network mask of
/32
bits, which means a single IP...