Open In App

Smap – A Drop-In Replacement For Nmap Powered By Shodan.Io

Last Updated : 01 May, 2022
Improve
Improve
Like Article
Like
Save
Share
Report

So we all know about the tool Nmap (Network Mapper) and just like the NMAP tool, Smap is also a network scanner that is used to discover any host and services running on a target system by sending packets and analyzing the responses. Smap is a passive Nmap-like scanner built with shodan.io, it is a full replica of Nmap that is using shodan.io’s free API for port scanning. All the command line arguments are the same as NMAP and all the output it provides is like NMAP which makes it a proper drop-in replacement for Nmap.

Advantages/Features/Uses

  • It can be used to Scanning  200 hosts per second.
  • You don’t require any account/api key.
  • You would be able to detect Vulnerability.
  • All the nmap’s output formats are supported.
  • Service and version fingerprinting are available able.
  • It won’t make any contact with the targets.
  • Smap fetches existing port data from shodan.io making it super fast.

Installation steps with Screenshots and Commands

Now, let’s discuss how we can install the tool.

Step 1: Make sure you have GO language installed on your system or else go and install it from here

 

Go Installation

 

Step 2: Navigate and download the tool on your system using the following command.

sudo git clone https://github.com/s0md3v/Smap.git
Tool Installation

 

Step 3: Navigate inside the directory of the Smap tool and use the following command.

sudo go build
Building Tool

 

Step 4: Now move the tool into the /usr/local/bin/  by using the following command.

sudo mv smap /usr/local/bin/  
Moving tool to bin directory

 

Step 5: Confirm that the tool is installed by typing the following command.

Smap
Verifying Installation

 

Usage/Examples of Smap Tool

Now you can use Smap by taking the same arguments as Nmap (just the options -p, -h, -o*, -iL are ignored). 

Target IP: 202.168.56.135

smap -sV 202.168.56.135

We have got the results of our scan which consists of open ports, services, and version details.

Scanning Target IP

 


Like Article
Suggest improvement
Previous
Next
Share your thoughts in the comments

Similar Reads