ScanSSH supports scanning a list of addresses and networks for open proxies, SSH protocol servers, Web and SMTP servers. Where possible ScanSSH, displays the version number of the running services. ScanSSH protocol scanner supports random selection of IP addresses from large network ranges and is useful for gathering statistics on the deployment of SSH protocol servers in a company or the Internet as whole
ScanSSH supports the following features:
Variable scanning speed. Per default, ScanSSH sends out 100 probes per second. The -r flag can be used to change the number of probes sent per second.
Open proxy detection. The -p flag initializes scan modules to detect open proxies on common ports.
Random sampling. It is possible to randomly sample hosts on the Internet, for example, by specifying ‘random(1000)/0.0.0.0/0? as address parameter.
Install scanssh on ubuntu
Open the terminal and run the following command
sudo apt-get install scanssh
scanssh [-VIERph] [-s scanners,…] [-n ports,…] [-u socks hosts,…] [-e excludefile] addresses…
-V’ Causes scanssh to print its version number.
-I’ Does not send a SSH identification string.
-E’ Exit the program, if the file containing the addresses for exclusion can not be found.
-R’ If addresses are generated at random, this flag causes the program to ignore excluded addresses from the exclude file. The default behaviour is to always exclude addresses.
-p’ Specifies that ScanSSH should operate as a proxy detector. This flag sets the default modes and default scanners to detect open proxies.
-h’ Displays the usage of the program.
-n ports,…’ Specifies the port numbers to scan. Ports are separated by commas. Each specified scanner is run for each port in this list. The default is 22.
-u socks hosts,…
A list of comma separated host:port pairs of SOCKS proxies that scanssh should use to scan through.
-s scanners’ Specifies a number of scanners should be executed for each open port. Multiple scanners are separated by commas. The following scanners are currently supported:
ssh’ Finds versions for SSH, Web and SMTP servers.
socks5? Detects if a SOCKS V5 proxy is running on the port.
socks4? Detects if a SOCKS V4 proxy is running on the port.
http-proxy’ Detects a HTTP get proxy.
Detects a HTTP connect proxy.
Detects telnet based proxy servers.
Specifies the file that contains the addresses to be excluded from the scan. The syntax is the same as for the addresses on the command line.
The following command scans the class C network 10.0.0.0 – 10.0.0.255 for open proxies:
scanssh -p 10.0.0.0/24
The next command scans for ssh servers on port 22 only:
scanssh -n 22 -s ssh 192.168.0.0/16
The following command can be used in a parallel scan. Two hosts scan the specified networks randomly, where this is the first host:
scanssh ‘random(0,rsd)/split(1,2)/(192.168.0.0/16 10.1.0.0/24):22,80?