#network #security #scan

netscan-service

Service detection library for netscan

3 releases (breaking)

0.13.0 Nov 16, 2022
0.12.0 Jul 9, 2022
0.11.0 Jul 3, 2022
0.1.0 Nov 21, 2021

#1634 in Network programming

Download history 28/week @ 2022-10-16 22/week @ 2022-10-23 32/week @ 2022-10-30 16/week @ 2022-11-06 38/week @ 2022-11-13 21/week @ 2022-11-20 6/week @ 2022-11-27 11/week @ 2022-12-04 20/week @ 2022-12-11 15/week @ 2022-12-18 13/week @ 2022-12-25 4/week @ 2023-01-01 12/week @ 2023-01-08 7/week @ 2023-01-15 17/week @ 2023-01-22 29/week @ 2023-01-29

65 downloads per month
Used in netscan

MIT license

9KB
180 lines

netscan Crates.io License

Cross-platform network scan library
with the aim of being lightweight and fast.

Features

  • Port Scan
    • TCP SYN scan
    • TCP CONNECT scan
  • Host Scan
    • ICMP PING scan
    • TCP PING scan

Usage

Add netscan to your dependencies

[dependencies]
netscan = "0.13.0"

Example

Port Scan Example

use netscan::blocking::PortScanner;
use netscan::setting::{ScanType, Destination};
use std::time::Duration;
use std::net::{IpAddr, Ipv4Addr};

fn main() {
    let mut port_scanner = match PortScanner::new(IpAddr::V4(Ipv4Addr::new(192, 168, 1, 4))) {
        Ok(scanner) => (scanner),
        Err(e) => panic!("Error creating scanner: {}", e),
    };
    // Add scan target
    let dst_ip: IpAddr = IpAddr::V4(Ipv4Addr::new(192, 168, 1, 8));
    //let dst: Destination = Destination::new(dst_ip, vec![22, 80, 443]);
    let dst: Destination = Destination::new_with_port_range(dst_ip, 1, 1000);
    port_scanner.add_destination(dst);
    // Set options
    port_scanner.set_scan_type(ScanType::TcpSynScan);
    port_scanner.set_timeout(Duration::from_millis(10000));
    port_scanner.set_wait_time(Duration::from_millis(100));
    //port_scanner.set_send_rate(Duration::from_millis(1));
    // Run scan 
    let result = port_scanner.scan();
    // Print results 
    println!("Status: {:?}", result.scan_status);
    println!("Results:");
    for (ip, ports) in result.result_map {
        println!("{}", ip);
        for port in ports {
            println!("{:?}", port);
        }
    }
    println!("Scan Time: {:?}", result.scan_time);
}

Feature flags

The following feature flags can be used to enable/disable specific features.

--feature async

Enable async scanning.(Default feature)

--feature service

Enable service detection. (Experimental)

--feature os

Enable TCP/IP Stack Fingerprinting. (Experimental)

--feature full

Enable all of the above.

For more details see Examples

Supported platform

  • Linux
  • macOS
  • Windows

Note for Windows users

To build libpnet on Windows, follow the instructions below.

Windows

  • You must use a version of Rust which uses the MSVC toolchain
  • You must have WinPcap or npcap installed (tested with version WinPcap 4.1.3) (If using npcap, make sure to install with the "Install Npcap in WinPcap API-compatible Mode")
  • You must place Packet.lib from the WinPcap Developers pack in a directory named lib, in the root of this repository. Alternatively, you can use any of the locations listed in the %LIB%/$Env:LIB environment variables. For the 64 bit toolchain it is in WpdPack/Lib/x64/Packet.lib, for the 32 bit toolchain, it is in WpdPack/Lib/Packet.lib.

Source

Additional Notes

This library requires the ability to create raw sockets. Execute with administrator privileges.

Dependencies

~1.5–6MB
~102K SLoC