Skip to content

Discover#

The networkscan discover command performs network discovery tasks to identify live hosts, open ports, running services, and TLS configurations.

Usage#

networkscan discover [command]

Commands#

Host#

Identify live hosts within a given IP, hostname, or CIDR range using various discovery techniques.

Usage#

networkscan discover host --target 192.168.1.0/24 --scan-type ICMP_ECHO

Stealth Mode#

Use stealth mode for slower, less detectable scans:

networkscan discover host --target 192.168.1.0/24 --sleep 2 --jitter 10 --reverse-lookup

Help Text#

networkscan discover host -h
Identify live hosts within a given IP, hostname, or CIDR range using various discovery techniques.

Usage:
  networkscan discover host [flags]

Flags:
  -h, --help                  help for host
      --jitter int            Jitter percentage (0-100) to randomize sleep delay for stealth scan
      --reverse-lookup        Perform reverse DNS lookup sweep first to identify potential targets
      --scan-type string      Discovery scan type: TCP_SYN, TCP_ACK, ICMP_ECHO, ICMP_TIMESTAMP, ARP, or ICMP_ADDRESS_MASK (not needed for stealth mode) (default "ICMP_ECHO")
      --sleep int             Sleep delay in seconds between hosts for stealth scan (stealth mode enabled when sleep > 0)
      --target string         Target IP address, hostname, or CIDR range to scan for live hosts

Global Flags:
  -o, --output string        Output format (signal, json, yaml). Default value is signal (default "signal")
  -f, --output-file string   Path to output file. If blank, will output to STDOUT
  -q, --quiet                Suppress output
  -v, --verbose              Verbose output

OS#

Detect and fingerprint the operating system running on a specified host (requires nmap and root privileges).

Usage#

networkscan discover os --target 127.0.0.1

Help Text#

networkscan discover os -h
Detect and fingerprint the operating system running on a specified host (requires nmap and root privileges).

Usage:
  networkscan discover os [flags]

Flags:
  -h, --help            help for os
      --target string   Target IP address or fully qualified domain name (FQDN) for OS fingerprinting

Global Flags:
  -o, --output string        Output format (signal, json, yaml). Default value is signal (default "signal")
  -f, --output-file string   Path to output file. If blank, will output to STDOUT
  -q, --quiet                Suppress output
  -v, --verbose              Verbose output

Port#

Scan target hosts for open TCP ports using customizable scan types and port ranges. Supports single IPs, hostnames, CIDR ranges, and IP ranges.

Usage#

networkscan discover port --target 127.0.0.1 --ports 22,80,443
networkscan discover port --target 192.168.1.0/24 --top-ports 100

Port Validation#

Validate discovered ports with service detection:

networkscan discover port --target example.com --top-ports 100 --validate --validate-hostname example.com

Stealth Mode#

Use stealth mode for slower, less detectable scans:

networkscan discover port --target 192.168.1.1 --ports 1-1000 --sleep 1 --jitter 20

Help Text#

networkscan discover port -h
Scan target hosts for open TCP ports using customizable scan types and port ranges. Supports single IPs, hostnames, CIDR ranges, and IP ranges.

Usage:
  networkscan discover port [flags]

Flags:
  -h, --help                            help for port
      --jitter int                      Jitter percentage (0-100) to randomize sleep delay for stealth scan
      --ports string                    Comma-separated list or range of TCP ports to scan (e.g., 22,80,443 or 1-1024)
      --scan-type string                Port scan type: SYN (default, requires root) or CONNECT (default "SYN")
      --sleep int                       Sleep delay in seconds between port scans for stealth scan (stealth mode enabled when sleep > 0)
      --target string                   Target IP address, FQDN, CIDR range, or IP range to scan for open ports
      --threads int                     Number of concurrent threads to use during port scanning (default 25)
      --top-ports string                Scan the top N most common TCP ports (options: full, 100, 1000)
      --validate                        Validate open ports by using service detection techniques
      --validate-attempt-timeout int    Timeout in seconds for each service detection attempt (default 10)
      --validate-hostname string        Hostname to validate against (e.g., example.com)
      --validate-threads int            Number of concurrent threads to use during service detection

Global Flags:
  -o, --output string        Output format (signal, json, yaml). Default value is signal (default "signal")
  -f, --output-file string   Path to output file. If blank, will output to STDOUT
  -q, --quiet                Suppress output
  -v, --verbose              Verbose output

Service#

Identify and fingerprint the network service running on a specific open port of a target host.

Usage#

networkscan discover service --target 127.0.0.1:443
networkscan discover service --target example.com:22

Stealth Mode#

Use stealth mode for specific service fingerprinting:

networkscan discover service --target 192.168.1.1:22 --service-type SSH

Help Text#

networkscan discover service -h
Identify and fingerprint the network service running on a specific open port of a target host.

Usage:
  networkscan discover service [flags]

Flags:
  -h, --help                 help for service
      --service-type string  Service type to fingerprint for stealth mode: SSH, HTTP, GRPC, KERBEROS, LDAP, SMB (stealth mode enabled when specified)
      --target string        Target address in format IP:port or hostname:port (e.g., 192.168.1.1:443)
      --timeout int          Timeout in seconds for each service fingerprinting attempt (default 5)

Global Flags:
  -o, --output string        Output format (signal, json, yaml). Default value is signal (default "signal")
  -f, --output-file string   Path to output file. If blank, will output to STDOUT
  -q, --quiet                Suppress output
  -v, --verbose              Verbose output

TLS#

Retrieve and analyze the TLS configuration and certificate details for one or more target addresses.

Usage#

networkscan discover tls --targets 127.0.0.1:443,example.com:443

Help Text#

networkscan discover tls -h
Retrieve and analyze the TLS configuration and certificate details for one or more target addresses.

Usage:
  networkscan discover tls [flags]

Flags:
  -h, --help               help for tls
      --targets strings    List of target addresses (IP:port or hostname:port) to analyze TLS configuration
      --timeout int        Timeout in seconds for each TLS handshake attempt (default 30)
      --verify-tls         Verify TLS certificates (default: false)

Global Flags:
  -o, --output string        Output format (signal, json, yaml). Default value is signal (default "signal")
  -f, --output-file string   Path to output file. If blank, will output to STDOUT
  -q, --quiet                Suppress output
  -v, --verbose              Verbose output

Domain#

Discover domain information from a target host using LDAP/SMB discovery and DNS enumeration of domain controllers.

Usage#

networkscan discover domain --target 192.168.1.1
networkscan discover domain --target dc.example.com

Help Text#

networkscan discover domain -h
Discover domain information from a target host using LDAP/SMB discovery and DNS enumeration of domain controllers.

Usage:
  networkscan discover domain [flags]

Flags:
  -h, --help            help for domain
      --target string   Target IP address or hostname to discover domain information from

Global Flags:
  -o, --output string        Output format (signal, json, yaml). Default value is signal (default "signal")
  -f, --output-file string   Path to output file. If blank, will output to STDOUT
  -q, --quiet                Suppress output
  -v, --verbose              Verbose output