Arp Menu - kartik2005221/Omni-Scanner GitHub Wiki
This menu provides three methods to identify and analyze devices on your network.
Purpose: Rapidly discover all active devices on the local network.
- Method: ARP (Address Resolution Protocol) scanning.
-
How It Works:
- Broadcasts ARP requests across the network.
- Lists devices that respond with their IP and MAC addresses.
- Speed: Completes in seconds (covers 254 IPs in ~3 sec).
-
Requirements:
- Full Functionality Mode (raw packet crafting).
- Local network access (does not work across subnets).
- Quickly audit connected devices (e.g., home/office networks).
- Identify unauthorized devices (e.g., intruders on Wi-Fi).
- Linux only with Full Functionality mode.
- No port or service details.
- Limited to the local subnet.
Purpose: Quickly check the status of specific IP addresses.
- Method: ICMP ping sweep.
-
How It Works:
- Sends ICMP echo requests to specified IPs.
- Identifies responsive hosts.
- Speed: Faster than Nmap-based scans.
- Verify if specific hosts are online.
- Quick connectivity checks.
- Less detailed than Nmap scans.
- May be blocked by firewalls.
Purpose: Perform an in-depth analysis of specific IPs or ranges.
- Method: Nmap-based scanning.
-
How It Works:
- Uses
nmap <IP range>
to probe:- Open/closed ports.
- Running services (e.g., HTTP, SSH).
- OS fingerprints.
- Uses
- Speed: Slower (seconds to minutes).
- Security audits of critical devices (e.g., servers, routers).
- Troubleshooting connectivity or service issues.
-
nmap 192.168.1.1-50
→ Scans IPs 1 to 50. -
nmap 192.168.1.10
→ Scans a single IP.
Feature | Fast Scan All IPs 🌐 | Fast Scan Specific IPs 🎯 | Deep Scan Specific IPs 🕵️♂️ |
---|---|---|---|
Method | ARP | ICMP Ping | Nmap |
Speed | Instant | Fast | Slow to Moderate |
Detail Level | Basic (IP+MAC) | Basic (Online Status) | Advanced (Ports, Services, OS) |
Network Scope | Local Subnet Only | Any Reachable IP | Any Reachable IP/Subnet |
Privileges | Requires sudo
|
Optional | Optional (depends on scan type) |
- 🚫 Always obtain explicit permission before scanning. Unauthorized scanning may violate privacy laws.
- 🔐 ARP/ICMP scans are less intrusive. Nmap scans may trigger security alerts.
- ⚡ For ARP scans, avoid overlapping with network-heavy tasks.
- 🎯 For Nmap, narrow IP ranges to reduce scan time (e.g.,
192.168.1.1-20
).
- 🐍 ARP Scan: Requires
scapy
(Python library). - 🛠️ Nmap Scan: Requires
nmap
installed. - 📡 ICMP Scan: Standard networking tools.
© AiR {Kartik} 2025 | Licensed for Ethical Use Only 🔐