Overview
scan4all integrates with nmap to provide comprehensive port scanning and service detection across 146 protocols. This extensive protocol coverage enables thorough network reconnaissance and service fingerprinting.Network service scanning is enabled by default when
priorityNmap=true. The tool uses optimized nmap parameters for faster scanning than masscan in most scenarios.Integration Architecture
Primary Scanner
nmap - When
priorityNmap=true (default)Comprehensive service detection with optimized parameters for speedAlternative Scanner
naabu - When
priorityNmap=falseFast port scanning without service detectionPort Scanning Engine
Nmap Integration
Default Mode (priorityNmap=true):
- 146 protocol detection via nmap service fingerprints
- 90,000+ port scanning rules
- Service version detection
- OS fingerprinting
- Script scanning capabilities
Naabu Alternative
Fast Mode (priorityNmap=false):
- Faster scanning in poor network conditions
- Lower network traffic
- HTTP-related ports when
-tp httpspecified - SYN scan support
Skip Port Scanning
Import Existing Results:Protocol Categories
The 146 supported protocols span multiple categories:Common Network Services
Web Services
Web Services
- HTTP (80, 8080, 8000, 8008, 8888)
- HTTPS (443, 8443)
- HTTP-Proxy (3128, 8080)
- HTTP-Alt (591, 8008, 8080, 8081)
- HTTPS-Alt (832, 981, 1311, 7002, 7021, 7023, 7025, 7777, 8333, 8531, 8888)
- WebDAV (WebDAV over HTTP/HTTPS)
- SOAP (Simple Object Access Protocol)
- REST APIs
Email Protocols
Email Protocols
- SMTP (25, 587, 465)
- POP3 (110)
- POP3S (995)
- IMAP (143)
- IMAPS (993)
- Submission (587)
File Transfer
File Transfer
- FTP (21)
- FTPS (990)
- SFTP (22, via SSH)
- TFTP (69, UDP)
- NFS (2049)
- SMB/CIFS (139, 445)
- AFP (Apple Filing Protocol)
- WebDAV
Database Services
Database Services
- MySQL (3306)
- PostgreSQL (5432)
- Microsoft SQL Server (1433)
- Oracle (1521)
- MongoDB (27017)
- Redis (6379)
- Cassandra (9042)
- CouchDB (5984)
- Elasticsearch (9200, 9300)
- InfluxDB (8086)
- MemcacheD (11211)
Remote Access
Remote Access
- SSH (22)
- Telnet (23)
- RDP (3389)
- VNC (5900-5903)
- X11 (6000-6063)
- rlogin (513)
- rexec (512)
- rsh (514)
Directory Services
Directory Services
- LDAP (389)
- LDAPS (636)
- Kerberos (88)
- Active Directory (Multiple ports)
- DNS (53, TCP/UDP)
Network Management
Network Management
- SNMP (161, 162, UDP)
- SNMP-Trap (162, UDP)
- NetBIOS (137-139)
- WMI (Windows Management Instrumentation)
- WinRM (5985, 5986)
- SSH (Management access)
Messaging & Middleware
Messaging & Middleware
- AMQP (5672)
- MQTT (1883, 8883)
- Kafka (9092)
- RabbitMQ (5672, 15672)
- ActiveMQ (61616)
- ZeroMQ
- WebSocket (80, 443)
Application Servers
Application Servers
- Tomcat (8080, 8005, 8009)
- Weblogic (7001, 7002)
- JBoss (8080, 4444, 8083)
- WebSphere (9060, 9043)
- GlassFish (4848, 8080, 8181)
- Jetty
VoIP & Telephony
VoIP & Telephony
- SIP (5060, 5061)
- H.323 (1720)
- RTP (Real-time Transport Protocol)
- RTSP (554)
- IAX (4569)
Proxy & VPN
Proxy & VPN
- SOCKS4 (1080)
- SOCKS5 (1080)
- HTTP-Proxy (3128, 8080)
- OpenVPN (1194)
- IPSec (500, 4500, UDP)
- PPTP (1723)
- L2TP (1701)
IoT & Embedded
IoT & Embedded
- MQTT (1883)
- CoAP (5683, UDP)
- Modbus (502)
- BACnet (47808, UDP)
- UPnP (1900, UDP)
- RTSP (554)
Industrial Control (ICS/SCADA)
Industrial Control (ICS/SCADA)
- Modbus TCP (502)
- DNP3 (20000)
- BACnet (47808)
- Ethernet/IP (44818)
- Profinet (34962-34964)
- S7 (102)
- OPC (135, 4840)
Streaming & Media
Streaming & Media
- RTSP (554)
- RTMP (1935)
- HLS (HTTP-based)
- MPEG-DASH
- ICY (SHOUTcast)
Version Control
Version Control
- Git (9418)
- SVN (3690, HTTP/HTTPS)
- CVS (2401)
- Perforce (1666)
- Mercurial (HTTP-based)
Printing Services
Printing Services
- IPP (631)
- LPD (515)
- JetDirect (9100)
Time Services
Time Services
- NTP (123, UDP)
- Time (37)
- Daytime (13)
Monitoring & Logging
Monitoring & Logging
- Syslog (514, UDP)
- SNMP (161, UDP)
- Graphite (2003, 2004)
- StatsD (8125, UDP)
- Prometheus (9090)
Authentication Services
Authentication Services
- RADIUS (1812, 1813, UDP)
- TACACS+ (49)
- Kerberos (88)
- OAuth (HTTP-based)
- SAML (HTTP-based)
Miscellaneous Services
Miscellaneous Services
- Echo (7, TCP/UDP)
- Discard (9, TCP/UDP)
- Chargen (19, TCP/UDP)
- Finger (79)
- Gopher (70)
- Whois (43)
- IRC (6667, 6697)
- XMPP (5222, 5223)
Service Detection
Version Detection
scan4all leverages nmap’s service version detection to identify:- Service name and version
- Operating system fingerprinting
- Device type identification
- Service configuration details
Fingerprinting
HTTP Fingerprinting
- 7000+ web fingerprints
- httpx integration
- vscan fingerprints (eHoleFinger, localFinger)
- Custom scan4all fingerprints
Service Fingerprinting
- Nmap service probes
- Banner grabbing
- Protocol-specific detection
- Custom fingerprint extensions
Port Range Configuration
Default Scanning
Protocol-Specific Ports
Nmap Configuration
Environment Setup
Configuration Script:config/doNmapScan.sh
Optimized Parameters
From the documentation, scan4all uses optimized nmap parameters that are:- Faster than masscan in good network conditions
- More comprehensive service detection
- Better fingerprinting accuracy
Multi-Target Scanning
Input Formats
Single Host
Single Host
IP Range (CIDR)
IP Range (CIDR)
File Input
File Input
Standard Input
Standard Input
URL Input
URL Input
Intelligence Features
Smart Processing
IP Consolidation
Multiple Domains, Same IPWhen multiple domains resolve to the same IP, scan4all automatically merges port scans to improve efficiency.
DNS Analysis
Multiple IPs per DomainAutomatically identifies and scans all IPs associated with a domain (DNS round-robin, CDN, etc.).
SSL Certificate Intelligence
Smart SSL Analysis: Automatically correlates and scans domain names discovered in SSL certificates (e.g.,
*.example.com).Subdomain Integration
scan4all integrates with subfinder for comprehensive subdomain enumeration:- From SSL certificates
- From subfinder database
- From DNS records
- Automatically added to scan targets
Service-Specific Detection
Web Services
HTTP/HTTPS Detection:- Landing page identification
- Sensitive file detection with custom dictionaries
- HTTP smuggling detection (CL-TE, TE-CL, TE-TE, CL-CL, BaseErr)
- HTTP Request Smuggling
- Web cache vulnerability scanning
- httpx fingerprints
- vscan fingerprints (eHoleFinger, localFinger)
- Custom scan4all fingerprints
- Framework detection
- CMS identification
Database Services
Automatic Detection & Testing:- Port scanning detects database services
- Automatic password testing when
priorityNmap=true - Version fingerprinting
- Configuration detection
Application Servers
Detection Capabilities:- Weblogic (with nuclei integration for T3/IIOP)
- Tomcat (version and manager detection)
- JBoss (version and exposed interfaces)
Output & Reporting
Output Formats
Standard Output (STDOUT)
Standard Output (STDOUT)
JSON Output
JSON Output
CSV Output
CSV Output
Text Output
Text Output
Elasticsearch Integration
Setup:- Each tool’s results stored separately
- Nmap results:
nmap_index - Hydra results:
hydra_index - Nuclei results:
nuclei_index - Custom indices configurable
Advanced Features
Scanning Progress
Honeypot Detection
Intelligent Honeypot Detection: Automatically identifies and skips honeypots to avoid wasting time and resources.
HTTP Abnormal Page Detection
Smart Processing:- Fingerprint calculation and learning
- 404 detection using similarity algorithms
- Automatic baseline establishment
- False positive reduction
Supply Chain Analysis
Automated Detection:- Supply chain identification
- Dependency analysis
- Vulnerability correlation
- Risk assessment
Integration with Other Tools
Nuclei Integration
- 15,000+ POC detection
- CVE detection
- Misconfiguration detection
- Exposed panel detection
- Technology-specific vulnerabilities
VScan Integration
POC Coverage:- X-ray 2.0 300+ POCs
- Go POCs
- Custom scan4all POCs
Log4j-Scan Integration
- Blocks target info from DNS Log Server (privacy protection)
- Elasticsearch integration
- Batch processing
Performance Optimization
Network Considerations
Good Network
Use nmap (
priorityNmap=true)- Comprehensive detection
- Service fingerprinting
- Version detection
Poor Network
Use naabu (
priorityNmap=false)- Faster scanning
- Lower traffic
- Basic port detection
Scanning Speed
Thread Configuration
Configuration Files
Main Configuration
File:config/config.json
Configurable Options:
- Port ranges
- Protocol lists
- Fingerprint databases
- Dictionary locations
- Timeout values
- Thread limits
- Output formats
- Integration settings
Custom Dictionaries
HTTP File Fuzzing:- Custom sensitive file dictionaries
- Path traversal wordlists
- Backup file patterns
- Custom protocol fingerprints
- Service version signatures
- Banner patterns
Troubleshooting
Nmap Not Found
Nmap Not Found
Solution: Install nmap before using scan4all:
Incomplete Scan Results
Incomplete Scan Results
Causes:
- High network latency
- Packet loss
- Firewall interference
- Target overload
- Switch to naabu:
priorityNmap=false - Reduce thread count
- Increase timeout values
- Scan in smaller batches
Root Password Issues
Root Password Issues
Problem: Nmap requires root for SYN scansSolution:Alternative: Run with sudo (not recommended)
Slow Scanning
Slow Scanning
Optimizations:
- Use top ports:
-top-ports 1000 - Disable honeypot detection (default)
- Disable subdomain enumeration
- Use naabu instead of nmap
- Increase thread count
- Skip unnecessary protocols
Firewall Blocking
Firewall Blocking
Indicators:
- All ports show closed
- No service detection
- Timeout errors
- Verify firewall rules
- Try different source ports
- Use timing templates
- Consider alternative scanning methods
Security Considerations
Stealth Considerations
- Nmap scanning is detectable by IDS/IPS systems
- Adjust timing to avoid detection
- Consider scan frequency
- Monitor for defensive responses
- Use appropriate scanning windows
Best Practices
- Authorization: Always obtain written permission
- Scope Definition: Clearly define target scope
- Timing: Scan during approved windows
- Rate Limiting: Avoid overwhelming targets
- Documentation: Log all scanning activities
- Notification: Inform stakeholders before scanning
Integration Workflows
Reconnaissance Pipeline
Manual Workflow
Related Documentation
Protocol Overview
Complete protocol support overview
Password Cracking
Authentication testing protocols
Usage Guide
Detailed usage examples