Arp Menu - kartik2005221/Omni-Scanner GitHub Wiki

← Back

This menu provides three methods to identify and analyze devices on your network.


1. Fast Scan: All IPs on Network 🌐⚡ (Less Detailed)

Purpose: Rapidly discover all active devices on the local network.

Technical Details:

  • Method: ARP (Address Resolution Protocol) scanning.
  • How It Works:
    • Broadcasts ARP requests across the network.
    • Lists devices that respond with their IP and MAC addresses.
  • Speed: Completes in seconds (covers 254 IPs in ~3 sec).
  • Requirements:
    • Full Functionality Mode (raw packet crafting).
    • Local network access (does not work across subnets).

When to Use:

  • Quickly audit connected devices (e.g., home/office networks).
  • Identify unauthorized devices (e.g., intruders on Wi-Fi).

Availability:

  • Linux only with Full Functionality mode.

Limitations:

  • No port or service details.
  • Limited to the local subnet.

2. Fast Scan: Specific IP(s) 🎯⚡ (Less Detailed)

Purpose: Quickly check the status of specific IP addresses.

Technical Details:

  • Method: ICMP ping sweep.
  • How It Works:
    • Sends ICMP echo requests to specified IPs.
    • Identifies responsive hosts.
  • Speed: Faster than Nmap-based scans.

When to Use:

  • Verify if specific hosts are online.
  • Quick connectivity checks.

Limitations:

  • Less detailed than Nmap scans.
  • May be blocked by firewalls.

3. Deep Scan: Specific IP(s) 🕵️‍♂️🐢 (More Detailed, Slower)

Purpose: Perform an in-depth analysis of specific IPs or ranges.

Technical Details:

  • Method: Nmap-based scanning.
  • How It Works:
    • Uses nmap <IP range> to probe:
      • Open/closed ports.
      • Running services (e.g., HTTP, SSH).
      • OS fingerprints.
  • Speed: Slower (seconds to minutes).

When to Use:

  • Security audits of critical devices (e.g., servers, routers).
  • Troubleshooting connectivity or service issues.

Example Commands:

  • nmap 192.168.1.1-50 → Scans IPs 1 to 50.
  • nmap 192.168.1.10 → Scans a single IP.

Key Differences 📊

Feature Fast Scan All IPs 🌐 Fast Scan Specific IPs 🎯 Deep Scan Specific IPs 🕵️‍♂️
Method ARP ICMP Ping Nmap
Speed Instant Fast Slow to Moderate
Detail Level Basic (IP+MAC) Basic (Online Status) Advanced (Ports, Services, OS)
Network Scope Local Subnet Only Any Reachable IP Any Reachable IP/Subnet
Privileges Requires sudo Optional Optional (depends on scan type)

Important Notes ⚠️

Ethical Use:

  • 🚫 Always obtain explicit permission before scanning. Unauthorized scanning may violate privacy laws.
  • 🔐 ARP/ICMP scans are less intrusive. Nmap scans may trigger security alerts.

Performance Tips:

  • ⚡ For ARP scans, avoid overlapping with network-heavy tasks.
  • 🎯 For Nmap, narrow IP ranges to reduce scan time (e.g., 192.168.1.1-20).

Dependencies:

  • 🐍 ARP Scan: Requires scapy (Python library).
  • 🛠️ Nmap Scan: Requires nmap installed.
  • 📡 ICMP Scan: Standard networking tools.

📚 Menu


© AiR {Kartik} 2025 | Licensed for Ethical Use Only 🔐

⚠️ **GitHub.com Fallback** ⚠️