You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Evaluate adding Masscan to the Image.
https://github.com/robertdavidgraham/masscan
While there are a number of port scanners on the image there are none quite
this fast and flexible. It works wonders for things like CVE-2014-0160. Nmap
detection was slow and painful while scanning our internal /8 (Think
University), Masscan was able to tackle the /8 in 20 minutes while being rather
successful at identifying bad hosts.
I know as an attack tool it's easily blocked/slowed down but I don't believe it
is so wide spreed that many of the larger blocks are stopping it at this point.
On a red team it's a quick picture of the attack surface.
It should be noted this tool has wide spread adoption in the world of higher
education.
What is the expected output? What do you see instead?
Masscan will become a default installed app.
***Picture of me assaulting a clown to follow.
Original issue reported on code.google.com by [email protected] on 12 May 2014 at 2:43
The text was updated successfully, but these errors were encountered:
1.) this bug is about do we want it on the live cd
2.) please stop forking gentoo ebuilds into the pentoo overlay. remove masscan
from pentoo and open a gentoo bug if you have any fixes.
Original comment by sidhayn on 15 May 2014 at 7:45
I did not fork it for nothing. The bug report is opened for 2 years:
https://bugs.gentoo.org/show_bug.cgi?id=366609
Our fork supports that kernel module optionally.
Original comment by blshkv on 16 May 2014 at 12:20
Original issue reported on code.google.com by
[email protected]
on 12 May 2014 at 2:43The text was updated successfully, but these errors were encountered: