Advance IP Menu - kartik2005221/Omni-Scanner GitHub Wiki

← Back

The Advanced Scan menu offers powerful network reconnaissance tools to analyze targets in depth. Choose between single IP or IP range scanning, then select from various techniques to suit your needs.


Scan Types:

  • [4] Advanced scan (single IP) - Scan one specific target 🎯
  • [5] Advanced scan (IP range) - Scan multiple targets in a range 🎯🎯🎯

Scan Options (appear after selecting 4 or 5):

  • [1] Simple Nmap scan (fast) ⚑

    • Purpose: Quickly check for open ports on a target.
    • Best For: Initial reconnaissance.
    • Note: Use alone, not combinable with other options.
  • [2] Detect operating system πŸ’»

    • Purpose: Identify target's OS (Windows, Linux, etc.).
    • Method: Network response fingerprinting.
  • [3] Detect running services and versions πŸ”

    • Purpose: Find software versions on open ports.
    • Best For: Vulnerability identification.
  • [4] SYN scan πŸ‘»

    • Purpose: Stealthy port discovery.
    • Advantage: Avoids full TCP connection logging.
  • [5] UDP scan πŸ’§

    • Purpose: Find open UDP ports.
    • Critical For: DNS, DHCP, and VoIP services.
  • [6] Specific port scan πŸ“Œ

    • Purpose: Focus on user-defined ports.
    • Usage: Enter ports like "80,443,22" when prompted.
  • [7] Full port scan ♾️

    • Purpose: Comprehensive 65,535 port check.
    • Warning: Time-consuming - use judiciously. ⏳
  • [8] Aggressive scan πŸ’₯

    • Includes: OS detection, service versions, script scanning.
    • Best For: Professional security audits.
  • [9] Firewall bypass scan 🧱

    • Purpose: Evade basic firewall protections.
    • Method: Uses fragmented packets and other techniques.
  • [10] Disable ARP ping 🚫

    • Purpose: Avoid detection by local routers.
    • Useful For: Internal network stealth scanning.

Key Rules:

  1. Combination Rules:

    • Can combine most options (e.g., "2 3 4" for OS, services, and SYN scan).
    • Never combine 6 and 7 (specific vs full port scan). β›”
    • Option 1 (Simple Nmap) must be used alone. ☝️
  2. Performance Considerations:

    • UDP scans (5) are slower than TCP scans. 🐒
    • Aggressive scans (8) generate significant traffic. πŸ“ˆ
    • Firewall bypass (9) increases scan duration. ⏱️
  3. Ethical Guidelines:

    • Always obtain proper authorization. 🀝
    • Avoid scanning during business-critical hours. ⏰
    • Consider using stealth options on production networks. 🀫

Sample Use Cases:

  • Quick Check: Option 1 (Simple Nmap)
  • Security Audit: "2 3 8" (OS, services, aggressive)
  • Network Troubleshooting: "5" (UDP scan for DNS issues)
  • Stealth Assessment: "4 10" (SYN scan with ARP disable)

Warnings: 🚨

  • Unauthorized scanning may violate computer crime laws. βš–οΈ
  • Aggressive scans may trigger intrusion detection systems. πŸ›‘οΈ
  • Scanning critical systems may cause service disruptions. πŸ›‘

πŸ“š Menu


© AiR {Kartik} 2025 | Licensed for Ethical Use Only 🌟