Short: ExScan 0.4 port by LouiSe - TCP/IP portscanner Author: LouiSe Uploader: LouiSe Type: comm.tcp Architecture: m68k-amigaos REQUIRES IXEmul package! http://www.ninemoons.com http://amigaonly.ahol.com/louise ================================================== exscan - v0.4 - By PolarRoot [pi9@hotmail.com] [http://exscan.netpedia.net] QueSO - Remote OS Identification - By Savage QueSO code has been modified and integrated with permission. Usage: ./exscan [options] [port] [options] - command line options (see list below) - name of target computer (IP or name); required [port] - port number(s) to scan; space-delimited list Options: -f - send output to file -h or -? - show on-screen help (this screen) -l - only list services which would be scanned -o - only perform QueSO - do not port scan -q - disable QueSO remote OS identification -v - verbose mode -V - print version information Examples: ./exscan 127.0.0.1 ./exscan www.rootshell.com 80 ./exscan www.l0pht.com 23 80 110 ================================================== INTRODUCTION exscan is a network/Internet port scanner, that uses the strobe-scan technique of only scanning certain ports, instead of a full blown port scan. The ports which exscan scans can be viewed in the file SERVICES which is distributed with exscan. exscan is not only a port scanner, though. With some services (such as finger and HTTP) exscan queries the server for information (such as the users on finger; and the server version on HTTP). On other services (such as FTP, SMTP, and others) exscan displays the information returned by the server, sometimes called a banner, and usually including the server type and version. Starting with the 0.3 release, exscan has the remote OS identification functionality from QueSO integrated into the exscan interface. Now whenever you scan a host you'll also know whether the target is running Linux, Windows, or any other operating system. exscan aims to be a tool which can handle all of your port scanning and machine scanning needs within the comfortable interface of a single program. I hope you find exscan useful. If you have any suggestions (or hopefully improvements you have made) please send them to me. I believe that the best way for exscan to evolve, is for programmers and hackers around the world to use it, break it, and improve it. E-mail me at: pi9@hotmail.com ================================================== INSTALLATION 1) To compile, type: make 2) To install, as root type: make install Not too painful, eh? ================================================== HOW-TO-USE exscan exscan must be run with the name of the target computer, or the host you wish to scan. The hostname can be in the form of a name (localhost) or IP address (127.0.0.1) If you do not want to scan all of the ports exscan scans by default (see SERVICES), you may also list the ports you do want exscan to scan after the host name. There can be any number of ports, delimited (or separated) by spaces. If you want to scan your own computer, you might use: exscan localhost If you only want to scan your computer for telnet, you might use: exscan localhost 23 If you want to scan your computer for telnet and HTTP, you might use: exscan localhost 23 80 Also, see the exscan on-screen help for information on the various command-line arguments. Here are some examples: To only list the services which would be scanned, you might use: exscan -l localhost To disable QueSO functionality, you might use: exscan -q localhost To only use QueSO operating system identification, you might use: exscan -o localhost To direct output to a file, instead of the console or screen, you might use: exscan -f localhost.scan localhost To only print the version information of exscan, you might use: exscan -V ================================================== exscan was written by PolarRoot (pi9@hotmail.com) on a RedHat Linux 5.1 box with the Linux 2.0.36 Kernel. The exscan homepage can be found at: http://exscan.netpedia.net/exscan.html