You can edit almost every page by Creating an account. Otherwise, see the FAQ.

Masscan

From EverybodyWiki Bios & Wiki





Masscan
Original author(s)Robert David Graham (erratarob)
Initial releaseAugust 2013; 10 years ago (2013-08)
Stable release
1.3.2 / 31 January 2021; 3 years ago (2021-01-31).[1]
Written inC, Lua
Engine
    Operating systemCross-platform
    Available inEnglish
    TypeNetwork security
    LicenseModified A-GPL-2[2]
    Websitegithub.com/robertdavidgraham/masscan

    Search Masscan on Amazon.

    Masscan is an open-source network scanner that can quickly scan large networks. In particular, it can scan the entire IPv4 Internet in under 5 minutes[3], from a single computer, when given sufficient network bandwidth (20-gbps) to the Internet.

    Whereas other network scanners, such as the popular Nmap, focus on doing heavy scans of a few targets, masscan focuses on doing a light scan of many targets.

    Masscan can send packets as fast as the underlying platform allows. This is usually a software limitation. A virtual machine might be limited to 10-kpps and a standard Linux installation to 300-kpps. Tuning, or using a faster driver like PF_RING can increase speeds to millions of packets-per-second.[4]

    Masscan is included in hacking tookits like Kali Linux[5], as well as many Linux distros[6][7]. It's frequently used by ransomware criminals.[8][9]. It's popular among defenders for scanning their own networks quickly.[10][11][12]

    When major new vulnerabilities are discovered, defenders will often use masscan in conjunction with another script to quickly find that vulnerability on the network. For example, after the BlueKeep vulnerability was disclosed by Microsoft, defenders used masscan and a script to quickly detect affected devices on their network.[13]. Defenders often have to race attackers to find and fix their public servers first.[14]

    See also[edit]

    Some use of "" in your query was not closed by a matching "".Some use of "" in your query was not closed by a matching "".

    References[edit]

    1. "masscan/1.3.2". github.com. 2021-01-31. Retrieved 2021-01-31.
    2. "masscan license". Retrieved 2021-01-31.
    3. "Masscan the entire Internet in 3 minutes". Erratasec blog. 2013-09-14. Retrieved 2021-06-16. Unknown parameter |url-status= ignored (help)
    4. "Notes about masscan". github.com. Retrieved 2021-06-16.
    5. "masscan Package Description". tools.kali.org. Retrieved 2021-06-16.
    6. "masscan man page". ubuntu.com. Retrieved 2021-06-16.
    7. "mmasscan 1.3.2-1". archlinux.org. Retrieved 2021-06-16.
    8. Sheriden, Kelly (2021-02-02). "Interview With a Russian Cybercriminal". DarkReading.com. Retrieved 2021-06-16.
    9. Cimpanu, Catalin (2021-02-01). "New Trickbot module uses Masscan for local network reconnaissance". ZDNet.com. Retrieved 2021-06-16.
    10. "Masscan Tool". defense.gov. Retrieved 2021-06-16.
    11. Messier, Rik (2019-05-31). CEH V10 Certified Ethical Hacker Study Guide. Wiley. ISBN 9781119533269. Search this book on
    12. Wrightson, Tyler (2014-12-15). Advanced Persistent Threat Hacking. McGraw-Hill Education. p. 109. ISBN 9780071828376. Search this book on
    13. "MScanning for Bluekeep vulnerable RDP instances". isc.sans.edu. Retrieved 2021-06-16.
    14. Ilascu, Ionut (2020-08-24). "Iranian hackers attack exposed RDP servers to deploy Dharma ransomware". bleepingcomputer.com. Retrieved 2021-06-16.

    External links[edit]


    This article "Masscan" is from Wikipedia. The list of its authors can be seen in its historical and/or the page Edithistory:Masscan. Articles copied from Draft Namespace on Wikipedia could be seen on the Draft Namespace of Wikipedia and not main one.