{"id":3730,"date":"2014-06-04T23:32:02","date_gmt":"2014-06-04T15:32:02","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3730"},"modified":"2014-06-04T23:32:14","modified_gmt":"2014-06-04T15:32:14","slug":"owasp-ninja-pingu-high-performance-large-scale-network-scanner","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2014\/06\/owasp-ninja-pingu-high-performance-large-scale-network-scanner\/","title":{"rendered":"OWASP NINJA-PingU – High Performance Large Scale Network Scanner"},"content":{"rendered":"
NINJA-PingU (NINJA-PingU I<\/strong>s N<\/strong>ot J<\/strong>ust A<\/strong> Ping<\/strong> U<\/strong>tility) is a free open-source high performance network scanner tool for large scale analysis. It has been designed with performance as its primary goal and developed as a framework to allow easy plugin integration.<\/p>\n <\/p>\n Essentially it’s a high performance, large scale network scanner, the likes of which we haven’t seen for some time. There were a few such projects around in 2008-2009 like Angry IP Scanner<\/a> & Unicornscan<\/a>.<\/p>\n It comes out of the box with a set of plugins for services analysisembedded devices identification and to spot backdoors.<\/p>\n NINJA PingU takes advantage of raw sockets to reduce the three-way TCP handshake latency and it’s state. Directly sending IP packets also avoids the TCP stack overhead. It also implements non-blocking networking I\/O in the plugin’s interface by means of epoll. Each component is multithreaded and they have built-in caches to minimize synchronization points. In addition, the results persistment operations are buffered to reduce disk writes.<\/p>\n Options<\/strong><\/p>\n You can download v1.0 here:<\/p>\n v1.0.tar.gz<\/a><\/p>\n Or check out the repo on Github here – https:\/\/github.com\/OWASP\/NINJA-PingU<\/a><\/p>\n -t Number of sender threads.\r\n -p Port scan range. For instance, 80 or 20-80.\r\n -d Delay between packages sent (in usecs).\r\n -s No service discoverage (less bandwith load, more hosts\/time).\r\n -m Module to run. For instance, Service.\r\n [targets] Can be a single ip or a range (i.e. 0.0.0.0-255.0.0.0).\r\n -h Show this help.<\/pre>\n