1UNICORNSCAN(1)                  Network Tools                   UNICORNSCAN(1)
2
3
4

NAME

6       unicornscan  Version  0.4.6b  is a asynchronous network stimulus deliv‐
7       ery/response recoring tool.
8

SYNOPSIS

10       unicornscan [-b, --broken-crc  layer]  [-B,  --source-port  port]  [-d,
11       --delay-type type] [-D, --no-defpayload ] [-e, --enable-module modules]
12       [-E, --proc-errors ] [-F, --try-frags  ]  [-G,  --payload-group  group]
13       [-h,  --help ] [-H, --do-dns ] [-i, --interface interface] [-I, --imme‐
14       diate  ]  [-j,  --ignore-seq  ignore]   [-l,   --logfile   file]   [-L,
15       --packet-timeoutdelay]  [-m,  --mode mode] [-M, --module-dir directory]
16       [-p, --ports  string]  [-P,  --pcap-filter  filter]  [-q,  --covertness
17       covertness]  [-Q,  --quiet  ]  [-r, --pps rate] [-R, --repeats repeats]
18       [-s, --source-addr address] [-S, --no-shuffle ] [-t, --ip-ttl TTL] [-T,
19       --ip-tos  TOS]  [-w,  --safefile  file] [-W, --fingerprint fingerprint]
20       [-v, --verbose ] [-V, --version ]  [-z,  --sniff  ]  [-Z,  --drone-type
21       type] target list
22

DESCRIPTION

24       unicornscan: ...
25

OPTIONS

27       [-b, --broken-crc Layer]
28               Break  CRC sums on the following layers. N and T are valid, and
29              both may be used without separator, so NT  would  indicate  both
30              Network and Transport layers are to have invalid checksums.
31
32       [-B, --source-port Port]
33               Source  port  for sent packets, numeric value -1 means to use a
34              random source port (the default situation), and other valid set‐
35              tings are 0 to 65535. normally this option will not be used, but
36              sometimes it is useful to say scan from port 53 into a network.
37
38       [-d, --delay-type Type]
39               Specify the timer used for pps  calculations,  the  default  is
40              variable and will try and use something appropriate for the rate
41              you have selected. Note however, if available, the tsc timer and
42              the  gtod timer are very CPU intensive.  if you require unicorn‐
43              scan to not monopolize your system while running, consider using
44              the  sleep timer, normally 3.  it has been observed that the tsc
45              timer and gtod timer are required for high packet rates, however
46              this  is  highly  system dependent, and should be tested on each
47              hardware/platform combination. The tsc timer may not  be  avail‐
48              able on every cpu. The sleep timer module is not recommended for
49              scans where utmost accuracy is required.
50
51       [-D, --no-defpayload ]
52               Do not use default payloads when one cannot be found.
53
54       [-e, --enable-module List]
55               A comma separated list of modules to  activate  (note:  payload
56              modules  do not require explicit activation, as they are enabled
57              by default). an example would be `pgsqldb,foomod'.
58
59       [-E, --proc-errors ]
60               Enable processing of errors such as  icmp  error  messages  and
61              reset+ack messages (for example). If this option is set then you
62              will see responses that may or may not indicate the presence  of
63              a firewall, or other otherwise missed information.
64
65       [-F, --try-frags ]
66               It  is likely that this option doesn't work, don't bother using
67              it until it is fixed.
68
69       [-G, --payload-group Group]
70               activate payloads only from this  numeric  payload  group.  The
71              default payload group is 1.
72
73       [-h, --help ]
74               if  you don't know what this means, perhaps you should consider
75              not using this program.
76
77       [-H, --do-dns ]
78               Resolve dns hostnames before and after the scan (but  not  dur‐
79              ing,  as  that would likely cause superfluous spurious responses
80              during the scan, especially if udp  scanning).  the  hosts  that
81              will  be  resolved are (in order of resolution) the low and high
82              addresses of the range,  and  finally  each  host  address  that
83              replied  with something that would be visible depending on other
84              scan options. This option is  not  recommended  for  use  during
85              scans where utmost accuracy is required.
86
87       [-i, --interface Interface]
88               string representation of the interface to use, overriding auto‐
89              matic detection.
90
91       [-I, --immediate ]
92               Display results immediately as they are found in a sort of meta
93              report  format (read: terse). This option is not recommended for
94              use during scans where the utmost accuracy is required.
95
96       [-j, --ignore-seq Type]
97               A string representing the intended  sequence  ignorance  level.
98              This  affects the tcp header validity checking, normally used to
99              filter noise from the scan. If for example you wish to see reset
100              packets  with an ack+seq that is not set or perhaps intended for
101              something else appropriate use of this option would be R.  A  is
102              normally  used  for  more  exotic  tcp  scanning. normally the R
103              option is associated with reset scanning.
104
105       [-l, --logfile File]
106               Path to a file where flat text will  be  dumped  that  normally
107              would go to the users terminal. A limitation of this option cur‐
108              rently is that it only logs the output of the `Main' thread  and
109              not the sender and receiver.
110
111       [-L, --packet-timeout Seconds]
112               Numeric value representing the number of seconds to wait before
113              declaring the scan over. for connect scans sometimes this option
114              can  be  adjusted to get more accurate results, or if scanning a
115              high-latency target network; for example.
116
117       [-m, --mode Mode]
118               String representation of the  desired  scanning  mode.  Correct
119              usage  includes  U,  T, A and sf for Udp scanning, Tcp scanning,
120              Arp scanning, and Tcp Connect scanning respectively.
121
122       [-M, --module-dir Directory]
123               Path to a directory containing shared object `modules' for uni‐
124              cornscan to search.
125
126       [-p, --ports Ports]
127               A global list of ports to scan, can be overridden in the target
128              specification on a per target basis.
129
130       [-P, --pcap-filter Filter]
131               A pcap filter string to add to the listeners default pcap  fil‐
132              ter (that will be associated with the scan mode being used).
133
134       [-c, --covertness Level]
135               Numeric option that currently does nothing, except look cool.
136
137       [-Q, --quiet ]
138               This  option  is  intended  to make unicornscan play the `quiet
139              game'. If you are unfamiliar with its rules, consult with  some‐
140              one else who finds you irritating.
141
142       [-r, --pps Rate]
143               This  is  arguably  the  most important option, it is a numeric
144              option containing the desired packets per second for the  sender
145              to use. choosing a rate too high will cause your scan results to
146              be incomplete. choosing a rate too low will likely make you feel
147              as though you are using nmap.
148
149       [-R, --repeats Times]
150               The  number of times to completely repeat the senders workload,
151              this option is intended  to  improve  accuracy  during  critical
152              scans, or with scans going over a highly unreliable network.
153
154       [-s, --source-addr Address]
155               The address to use to override the listeners default interfaces
156              address. using this option often necessitates using  the  helper
157              program  fantaip(1)  to make sure the replies are routed back to
158              the interface the listener has open.
159
160       [-S, --no-shuffle ]
161               ..
162
163       [-t, --ip-ttl Number]
164               ..
165
166       [-T, --ip-tos Number]
167               ..
168
169       [-w, --savefile File]
170               ..
171
172       [-W, --fingerprint Type]
173               ..
174
175       [-v, --verbose ]
176               ..
177
178       [-V, --version ]
179               ..
180
181       [-z, --sniff ]
182               ..
183
184       [-Z, --drone-type Type]
185               ..
186

EXAMPLES

188       unicornscan    -msf    -s    5.4.3.2    -r    340     -Iv     -epgsqldb
189       www.domain.tld/21:80,8080,443,81  runs unicornscan in connect mode with
190       an apparent (to the target) source address of 5.4.3.2 at a rate of  340
191       packets  per second. results will be displayed as they are found -I and
192       the output will be verbose -v.  The module `pgsqldb' will be  activated
193       -epgsqldb and the target of this scan will be the /21 network that host
194       www.domain.tld belongs to making attempts to connect to port 80,  8080,
195       443 and 81.
196

FILES

198       unicorn.conf
199               The  file  containing  the  default  configuration  options for
200              usage.
201
202       modules.conf
203               The default file for module parameters.
204
205       oui.txt
206               Contains the MAC prefix to  vendor  mapping  used  in  Ethernet
207              scanning.
208
209       payloads.conf
210               The default file for tcp and udp payloads.
211
212       ports.txt
213               The protocol/port number to name mapping.
214

SEE ALSO

216       fantaip(1) unicfgtst(1) unicycle(1) unibrow(1) unicorn.conf(5)
217

REPORTING BUGS

219       Report Bugs to osace-users@lists.sourceforge.net
220
222       (C)2004  Jack Louis jack@rapturesecurity.org This is free software; see
223       the source for copying conditions. There is NO warranty; not  even  for
224       MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
225
226Network Tools                      03/30/05                     UNICORNSCAN(1)
Impressum