Scanless – Pentesting Tool to Perform Anonymous open Port Scan on Target Websites
The Information Gathering and Scanning phase is incomplete if the tester has not done Port Scanning or Port Detection on the target host. There can be some services that are running on a specific port. These services can be used to penetrate the host. To detect the active ports on the domain, there are various automated tools. Scanless is an automated tool developed in the Python language, which performs port scanning on the target host. Scanless tool uses some famous scanners to scan and fetch the results on the terminal itself. Scanless tool is available on the GitHub platform, it’s a free and open-source tool to use.
Port Scanners Supported
Note: Make Sure You have Python Installed on your System, as this is a python-based tool. Click to check the Installation process – Python Installation Steps on Linux
Installation of Scanless Tool on Kali Linux OS
Step 1: Use the following command to install the tool in your Kali Linux operating system.
git clone https://github.com/vesche/scanless.git
Step 2: Now use the following command to move into the directory of the tool. You have to move in the directory in order to run the tool.
Step 3: You are in the directory of the Scanless. Now you have to install the tool by using the following command.
sudo python3 setup.py install
Step 4: All the dependencies have been installed in your Kali Linux operating system. Now use the following command to run the tool and check the help section.
Working with Scanless Tool on Kali Linux OS
Example 1: To Run Scan
scanless -t geeksforgeeks.org -s spiderip
In this example, we are using the spiderip scanner to perform port scanning on the target domain geeksforgeeks.org
We have got the list of active ports on the http://geeksforgeeks.org domain.
Example 2: To list all the supported scanners
In this example, we are listing all the supported scanners by using the ‘-l’ tag
We have listed the available scanners used by the scanless tool
Example 3: scanless -s pingeu -t domain.com
scanless -s pingeu -t geeksforgeeks.org
In this example, we are using the pingeu scanner for port scanning against the target domain geeksforgeeks.org.
We have got the results which show that port 80 and port 443 are open on the http://geeksforgeeks.org domain.