Overview
This guide covers advanced scan4all features including DNSLOG integration, nmap integration, network interface configuration, and optimization settings.DNSLOG Integration
DNSLOG functionality enables detection of blind vulnerabilities that require out-of-band verification:You need a Ceye.io account to get your API key and subdomain.
How DNSLOG Works
Vulnerabilities Detected with DNSLOG
- Blind SQL Injection
- Blind XXE (XML External Entity)
- SSRF (Server-Side Request Forgery)
- Remote Code Execution
- Log4Shell and similar vulnerabilities
Nmap Integration
Import Nmap Results
Skip internal port scanning and use existing nmap XML results:- You’ve already performed comprehensive port scans
- You want to add vulnerability checks to nmap results
- You’re integrating scan4all into existing workflows
Custom Nmap Commands
Execute custom nmap scans on discovered targets:- Service Detection
- Script Scanning
- OS Detection
- Aggressive Scan
The nmap binary must be installed and accessible in your system PATH.
Network Configuration
Source IP Specification
Specify the source IP address for packets:- Multi-homed systems
- Source IP restrictions
- Bypassing simple IP-based filters
Network Interface Selection
Choose a specific network interface for scanning:List Available Interfaces
Display all network interfaces and your public IP:Terminal
Combined Network Configuration
DNS Resolution
Custom DNS Resolvers
Specify custom DNS servers for resolution:DNS Resolvers from File
Use a file containing DNS servers:Optimization Settings
Retry Configuration
Control the number of retry attempts for port scanning:Default is 3 retries. Higher values increase accuracy but slow down scans.
Timeout Settings
Adjust port connection timeout in milliseconds:- Network latency
- Target responsiveness
- Scan speed requirements
Warm-up Time
Delay between scan phases in seconds:- Avoiding rate limiting
- Allowing network buffers to clear
- Reducing IDS/IPS detection
Ping Probes
Enable ping verification to identify active hosts:- Faster scans by skipping offline hosts
- Reduced network traffic
- Improved accuracy
TCP Verification
Validate discovered ports with additional TCP connection attempts:Resume Functionality
Resume Interrupted Scans
Scan4all can resume interrupted scans:resume.cfg. This is useful for:
- Long-running scans that get interrupted
- Network connectivity issues
- System crashes or reboots
Stream Mode
Enable stream mode for continuous, real-time scanning:- Results displayed as soon as discovered
- No result buffering
- Disables resume, nmap integration, verify, and retries
- Lower memory usage
- Ideal for integration with other tools
Stream Mode Pipeline
Passive Scanning
Query Shodan InternetDB for port information without active scanning:Passive mode uses the free Shodan InternetDB API. No API key required.
- Completely passive (no packets sent to target)
- Fast results
- No IDS/IPS triggering
- Historical port data
- Only works for public IPs
- Data may be outdated
- Limited to Shodan’s coverage
Update Scan4all
Update to the latest version:- Check for the latest release
- Download and install updates
- Preserve your configuration
Practical Advanced Examples
Configuration Best Practices
Balance Speed and Accuracy
Adjust rate, timeout, and retries based on network conditions
Use DNSLOG for Blind Vulns
Configure Ceye.io for comprehensive vulnerability detection
Leverage Nmap Integration
Combine scan4all’s speed with nmap’s detailed service detection
Passive Recon First
Use passive mode to gather initial intelligence without alerting targets
Advanced Options Reference
| Option | Description | Default |
|---|---|---|
-ceyeapi | Ceye.io API key | None |
-ceyedomain | Ceye.io subdomain | None |
-nmap-cli | Custom nmap command | None |
-source-ip | Source IP address | Auto |
-i | Network interface | Auto |
-r | DNS resolvers | System |
-retries | Retry attempts | 3 |
-timeout | Connection timeout (ms) | 1000 |
-warm-up-time | Phase delay (seconds) | 2 |
-ping | Enable ping probes | false |
-verify | TCP verification | false |
-resume | Resume from resume.cfg | false |
-stream | Stream mode | false |
-passive | Passive Shodan lookup | false |
-update | Update scan4all | false |
Next Steps
Proxy Configuration
Learn to route scans through proxies for anonymity and access control