Discover#
The networkscan discover
command performs network discovery tasks to identify live hosts, open ports, running services, and TLS configurations.
Usage#
networkscan discover [command]
Commands#
Host#
Identify live hosts within a given IP, hostname, or CIDR range using various discovery techniques.
Usage#
networkscan discover host --target 192.168.1.0/24 --scan-type ICMP_ECHO
Stealth Mode#
Use stealth mode for slower, less detectable scans:
networkscan discover host --target 192.168.1.0/24 --sleep 2 --jitter 10 --reverse-lookup
Help Text#
networkscan discover host -h
Identify live hosts within a given IP, hostname, or CIDR range using various discovery techniques.
Usage:
networkscan discover host [flags]
Flags:
-h, --help help for host
--jitter int Jitter percentage (0-100) to randomize sleep delay for stealth scan
--reverse-lookup Perform reverse DNS lookup sweep first to identify potential targets
--scan-type string Discovery scan type: TCP_SYN, TCP_ACK, ICMP_ECHO, ICMP_TIMESTAMP, ARP, or ICMP_ADDRESS_MASK (not needed for stealth mode) (default "ICMP_ECHO")
--sleep int Sleep delay in seconds between hosts for stealth scan (stealth mode enabled when sleep > 0)
--target string Target IP address, hostname, or CIDR range to scan for live hosts
Global Flags:
-o, --output string Output format (signal, json, yaml). Default value is signal (default "signal")
-f, --output-file string Path to output file. If blank, will output to STDOUT
-q, --quiet Suppress output
-v, --verbose Verbose output
OS#
Detect and fingerprint the operating system running on a specified host (requires nmap and root privileges).
Usage#
networkscan discover os --target 127.0.0.1
Help Text#
networkscan discover os -h
Detect and fingerprint the operating system running on a specified host (requires nmap and root privileges).
Usage:
networkscan discover os [flags]
Flags:
-h, --help help for os
--target string Target IP address or fully qualified domain name (FQDN) for OS fingerprinting
Global Flags:
-o, --output string Output format (signal, json, yaml). Default value is signal (default "signal")
-f, --output-file string Path to output file. If blank, will output to STDOUT
-q, --quiet Suppress output
-v, --verbose Verbose output
Port#
Scan target hosts for open TCP ports using customizable scan types and port ranges. Supports single IPs, hostnames, CIDR ranges, and IP ranges.
Usage#
networkscan discover port --target 127.0.0.1 --ports 22,80,443
networkscan discover port --target 192.168.1.0/24 --top-ports 100
Port Validation#
Validate discovered ports with service detection:
networkscan discover port --target example.com --top-ports 100 --validate --validate-hostname example.com
Stealth Mode#
Use stealth mode for slower, less detectable scans:
networkscan discover port --target 192.168.1.1 --ports 1-1000 --sleep 1 --jitter 20
Help Text#
networkscan discover port -h
Scan target hosts for open TCP ports using customizable scan types and port ranges. Supports single IPs, hostnames, CIDR ranges, and IP ranges.
Usage:
networkscan discover port [flags]
Flags:
-h, --help help for port
--jitter int Jitter percentage (0-100) to randomize sleep delay for stealth scan
--ports string Comma-separated list or range of TCP ports to scan (e.g., 22,80,443 or 1-1024)
--scan-type string Port scan type: SYN (default, requires root) or CONNECT (default "SYN")
--sleep int Sleep delay in seconds between port scans for stealth scan (stealth mode enabled when sleep > 0)
--target string Target IP address, FQDN, CIDR range, or IP range to scan for open ports
--threads int Number of concurrent threads to use during port scanning (default 25)
--top-ports string Scan the top N most common TCP ports (options: full, 100, 1000)
--validate Validate open ports by using service detection techniques
--validate-attempt-timeout int Timeout in seconds for each service detection attempt (default 10)
--validate-hostname string Hostname to validate against (e.g., example.com)
--validate-threads int Number of concurrent threads to use during service detection
Global Flags:
-o, --output string Output format (signal, json, yaml). Default value is signal (default "signal")
-f, --output-file string Path to output file. If blank, will output to STDOUT
-q, --quiet Suppress output
-v, --verbose Verbose output
Service#
Identify and fingerprint the network service running on a specific open port of a target host.
Usage#
networkscan discover service --target 127.0.0.1:443
networkscan discover service --target example.com:22
Stealth Mode#
Use stealth mode for specific service fingerprinting:
networkscan discover service --target 192.168.1.1:22 --service-type SSH
Help Text#
networkscan discover service -h
Identify and fingerprint the network service running on a specific open port of a target host.
Usage:
networkscan discover service [flags]
Flags:
-h, --help help for service
--service-type string Service type to fingerprint for stealth mode: SSH, HTTP, GRPC, KERBEROS, LDAP, SMB (stealth mode enabled when specified)
--target string Target address in format IP:port or hostname:port (e.g., 192.168.1.1:443)
--timeout int Timeout in seconds for each service fingerprinting attempt (default 5)
Global Flags:
-o, --output string Output format (signal, json, yaml). Default value is signal (default "signal")
-f, --output-file string Path to output file. If blank, will output to STDOUT
-q, --quiet Suppress output
-v, --verbose Verbose output
TLS#
Retrieve and analyze the TLS configuration and certificate details for one or more target addresses.
Usage#
networkscan discover tls --targets 127.0.0.1:443,example.com:443
Help Text#
networkscan discover tls -h
Retrieve and analyze the TLS configuration and certificate details for one or more target addresses.
Usage:
networkscan discover tls [flags]
Flags:
-h, --help help for tls
--targets strings List of target addresses (IP:port or hostname:port) to analyze TLS configuration
--timeout int Timeout in seconds for each TLS handshake attempt (default 30)
--verify-tls Verify TLS certificates (default: false)
Global Flags:
-o, --output string Output format (signal, json, yaml). Default value is signal (default "signal")
-f, --output-file string Path to output file. If blank, will output to STDOUT
-q, --quiet Suppress output
-v, --verbose Verbose output
Domain#
Discover domain information from a target host using LDAP/SMB discovery and DNS enumeration of domain controllers.
Usage#
networkscan discover domain --target 192.168.1.1
networkscan discover domain --target dc.example.com
Help Text#
networkscan discover domain -h
Discover domain information from a target host using LDAP/SMB discovery and DNS enumeration of domain controllers.
Usage:
networkscan discover domain [flags]
Flags:
-h, --help help for domain
--target string Target IP address or hostname to discover domain information from
Global Flags:
-o, --output string Output format (signal, json, yaml). Default value is signal (default "signal")
-f, --output-file string Path to output file. If blank, will output to STDOUT
-q, --quiet Suppress output
-v, --verbose Verbose output