Mar 26, 2026
In this segment, we will explore some pretty awesome tools for
scanning the Internet, with a focus on network edge devices. We'll
bring it all together with Claude Code and look at some sample
results. Tools include:
- Shodan | Passive recon — query existing scan
data for exposed devices, services, and vulns | Passive (API) |
Instant (no packets sent)
- ZMap | Host discovery — find live hosts with
open ports | L4 (TCP SYN, UDP, ICMP) | Millions of packets/sec
- ZGrab2 | Application-layer handshakes — grab
banners, certs, headers | L7 (30+ protocol modules) | Thousands of
hosts/sec
- Nerva | Service fingerprinting — identify 140+
protocols with metadata, CPEs, technology stacks | L7 (TCP, UDP,
SCTP) | Fast, concurrent
- Nuclei | Template-based vulnerability scanning
— default creds, exposed panels, known CVEs | L7 (HTTP, network) |
Hundreds of targets/min
- Shannon | Vulnerability exploitation —
AI-powered whitebox pentesting of web apps | Application | ~1-1.5
hrs per target
- edgescan.py | Automated pipeline —
orchestrates all tools above into a single command | Orchestration
| End-to-end
Visit https://www.securityweekly.com/psw
for all the latest episodes!
Show Notes: https://securityweekly.com/psw-919
文章来源: http://sites.libsyn.com/18678/scanning-the-internet-with-linux-tools-psw-919
如有侵权请联系:admin#unsafe.sh