Skip to content
Related Articles

Related Articles

Evilscan – Massive IP Port Scanner

Improve Article
Save Article
Like Article
  • Last Updated : 17 Oct, 2021

Network Scanning is the phase in which information about the machines connected to the network is collected. This can be done with various methods, one of the best methods is using an automated tool. Evilscan is a network scanner developed in the NodeJS language. This tool has a variety of options like allowing the user to scan a single or bunch of IP addresses at the same time. 

It also supports users to choose a range of ports for scanning. With the help of this tool, we can discover the list of open ports on the target machine. TCPCONNECT, TCPSYN, and UDP methods are been supported by this tool. Evilscan tool is available on the GitHub platform, it’s free and open-source to use.

Note: Make Sure You have NodeJS Installed on your System, as this is a NodeJS-based tool. Click to check the Installation process: NodeJS Installation Steps on Linux

Installation of Evilscan Tool on Kali Linux OS

Step 1: Use the following command to install the tool in your Kali Linux operating system.

git clone https://github.com/eviltik/evilscan.git

Evilscan - Massive IP Port Scanner

Step 2: Now use the following command to move into the directory of the tool. You have to move in the directory in order to run the tool.

cd evilscan

Evilscan - Massive IP Port Scanner

Step 3: Install the requirements by using the following command.

sudo npm install -g evilscan

Evilscan - Massive IP Port Scanner

Step 4: Run the below command to verify the installation.

evilscan --help

Evilscan - Massive IP Port Scanner

Working with Evilscan Tool on Kali Linux OS

Example 1: Scan every port on localhost, grab a banner and display only opened ports

sudo evilscan 192.168.144.130 --port=0-65535 --banner

In this example, we are scanning the IP address for open ports and banner details (OS details).

Evilscan - Massive IP Port Scanner

We have got the results of our scan.

Evilscan - Massive IP Port Scanner

Example 2: Scan ports on localhost, grab a banner, display only opened ports, JSON output, progress status each second

sudo evilscan 192.168.144.130 –port=0-65535 –banner –isopen –istimeout –progress –json

In this example, we are displaying the results in the JSON format rather than the usual one.

Evilscan - Massive IP Port Scanner

We have got the results in JSON format.

Evilscan - Massive IP Port Scanner

Example 3: Port(s) you want to scan

sudo evilscan 192.168.144.130 --port=21-23,80

Evilscan - Massive IP Port Scanner

Example 4: Display DNS reverse lookup

sudo evilscan 192.168.144.130 --port=0-65535 --reverse 

Evilscan - Massive IP Port Scanner

Example 5: Only display results having a valid reverse dns, except if ports specified

sudo evilscan 192.168.144.130 --port=21-23,80 --reversevalid

Evilscan - Massive IP Port Scanner

Example 6: Display geoip (free maxmind)

sudo evilscan 34.218.62.116 --geo 

Evilscan - Massive IP Port Scanner

Example 7: Display banner

sudo evilscan 192.168.144.130 --port=0-100 --banner

Evilscan - Massive IP Port Scanner

Example 8: Set banner length grabbing

sudo evilscan 192.168.144.130 --port=21-23,80 --bannerlen 513

Evilscan - Massive IP Port Scanner

Example 9: Display raw banner (as a JSON Buffer)

sudo evilscan 192.168.144.130 --port=21-23,80 --bannerraw

Evilscan - Massive IP Port Scanner

Example 10: Display progress indicator each seconds

sudo evilscan 192.168.144.130 --port=21-23,80 --progress

Evilscan - Massive IP Port Scanner

Example 11: Ports status wanted in results

sudo evilscan 192.168.144.130 --port=21-23,80 --status=O

Evilscan - Massive IP Port Scanner

Example 12: Scan method

sudo evilscan 192.168.144.130 --port=21-23,80 --scan tcpconnect

Evilscan - Massive IP Port Scanner

Example 13: Max number of simultaneous socket opened

sudo evilscan 192.168.144.130 --port=21-23,80 --concurrency 400

Example 14: Maximum number of milliseconds before closing the connection

sudo evilscan 192.168.144.130 --port=21-23,80 --timeout 1500

Example 15: Display result format (json,xml,console)

sudo evilscan 192.168.144.130 --port=21-23,80 --display 

Evilscan - Massive IP Port Scanner

Example 16: Dump result in a file

sudo evilscan 192.168.144.130 –port=21-23,80 –outfile output.txt

Evilscan - Massive IP Port Scanner

Example 17: Shortcut for –display=json

sudo evilscan 192.168.144.130 --port=21-23,80 --json

Example 18: Shortcut for –display=xml

sudo evilscan 192.168.144.130 --port=21-23,80 --xml

Example 19: Shortcut for –display=console

sudo evilscan 192.168.144.130 --port=21-23,80 --console


My Personal Notes arrow_drop_up
Recommended Articles
Page :

Start Your Coding Journey Now!