Scanless – Pentesting Tool to Perform Anonymous open Port Scan on Target Websites
The Information Gathering and Scanning phase is incomplete if the tester has not done Port Scanning or Port Detection on the target host. There can be some services that are running on a specific port. These services can be used to penetrate the host. To detect the active ports on the domain, there are various automated tools. Scanless is an automated tool developed in the Python language, which performs port scanning on the target host. Scanless tool uses some famous scanners to scan and fetch the results on the terminal itself. Scanless tool is available on the GitHub platform, it’s a free and open-source tool to use.
Port Scanners Supported
- yougetsignal
- viewdns
- hackertarget
- ipfingerprints
- pingeu
- spiderip
- portcheckers
- t1shopper
Note: Make Sure You have Python Installed on your System, as this is a python-based tool. Click to check the Installation process – Python Installation Steps on Linux
Installation of Scanless Tool on Kali Linux OS
Step 1: Use the following command to install the tool in your Kali Linux operating system.
git clone https://github.com/vesche/scanless.git
Step 2: Now use the following command to move into the directory of the tool. You have to move in the directory in order to run the tool.
cd scanless
Step 3: You are in the directory of the Scanless. Now you have to install the tool by using the following command.
sudo python3 setup.py install
Step 4: All the dependencies have been installed in your Kali Linux operating system. Now use the following command to run the tool and check the help section.
scanless -h
Working with Scanless Tool on Kali Linux OS
Example 1: To Run Scan
scanless -t w3wiki.net -s spiderip
In this example, we are using the spiderip scanner to perform port scanning on the target domain w3wiki.net
We have got the list of active ports on the http://w3wiki.net domain.
Example 2: To list all the supported scanners
scanless -l
In this example, we are listing all the supported scanners by using the ‘-l’ tag
We have listed the available scanners used by the scanless tool
Example 3: scanless -s pingeu -t domain.com
scanless -s pingeu -t w3wiki.net
In this example, we are using the pingeu scanner for port scanning against the target domain w3wiki.net.
We have got the results which show that port 80 and port 443 are open on the http://w3wiki.net domain.