Advance IP Menu - kartik2005221/Omni-Scanner GitHub Wiki
The Advanced Scan menu offers powerful network reconnaissance tools to analyze targets in depth. Choose between single IP or IP range scanning, then select from various techniques to suit your needs.
Scan Types:
- [4] Advanced scan (single IP) - Scan one specific target π―
- [5] Advanced scan (IP range) - Scan multiple targets in a range π―π―π―
Scan Options (appear after selecting 4 or 5):
-
[1] Simple Nmap scan (fast) β‘
- Purpose: Quickly check for open ports on a target.
- Best For: Initial reconnaissance.
- Note: Use alone, not combinable with other options.
-
[2] Detect operating system π»
- Purpose: Identify target's OS (Windows, Linux, etc.).
- Method: Network response fingerprinting.
-
[3] Detect running services and versions π
- Purpose: Find software versions on open ports.
- Best For: Vulnerability identification.
-
[4] SYN scan π»
- Purpose: Stealthy port discovery.
- Advantage: Avoids full TCP connection logging.
-
[5] UDP scan π§
- Purpose: Find open UDP ports.
- Critical For: DNS, DHCP, and VoIP services.
-
[6] Specific port scan π
- Purpose: Focus on user-defined ports.
- Usage: Enter ports like "80,443,22" when prompted.
-
[7] Full port scan βΎοΈ
- Purpose: Comprehensive 65,535 port check.
- Warning: Time-consuming - use judiciously. β³
-
[8] Aggressive scan π₯
- Includes: OS detection, service versions, script scanning.
- Best For: Professional security audits.
-
[9] Firewall bypass scan π§±
- Purpose: Evade basic firewall protections.
- Method: Uses fragmented packets and other techniques.
-
[10] Disable ARP ping π«
- Purpose: Avoid detection by local routers.
- Useful For: Internal network stealth scanning.
Key Rules:
-
Combination Rules:
- Can combine most options (e.g., "2 3 4" for OS, services, and SYN scan).
- Never combine 6 and 7 (specific vs full port scan). β
- Option 1 (Simple Nmap) must be used alone. βοΈ
-
Performance Considerations:
- UDP scans (5) are slower than TCP scans. π’
- Aggressive scans (8) generate significant traffic. π
- Firewall bypass (9) increases scan duration. β±οΈ
-
Ethical Guidelines:
- Always obtain proper authorization. π€
- Avoid scanning during business-critical hours. β°
- Consider using stealth options on production networks. π€«
Sample Use Cases:
- Quick Check: Option 1 (Simple Nmap)
- Security Audit: "2 3 8" (OS, services, aggressive)
- Network Troubleshooting: "5" (UDP scan for DNS issues)
- Stealth Assessment: "4 10" (SYN scan with ARP disable)
Warnings: π¨
- Unauthorized scanning may violate computer crime laws. βοΈ
- Aggressive scans may trigger intrusion detection systems. π‘οΈ
- Scanning critical systems may cause service disruptions. π
π Menu
Β© AiR {Kartik} 2025 | Licensed for Ethical Use Only π