SMap: Difference between revisions

From SecurityTools
(Expand on tool functionality/description, add more "More Information")
m (→‎More Information: Add inline YouTube video for SMap introduction.)
 
Line 14: Line 14:
* An [https://allabouttesting.org/nmap-cheat-sheet/ NMap cheat sheet] which is also mostly applicable to SMap
* An [https://allabouttesting.org/nmap-cheat-sheet/ NMap cheat sheet] which is also mostly applicable to SMap
* A complete list of [https://api.shodan.io/shodan/ports the 1237 ports SMap scans] by default
* A complete list of [https://api.shodan.io/shodan/ports the 1237 ports SMap scans] by default
* A video [https://www.youtube.com/watch?v=PYVml5MF44A&pp=ygULc2hvZGFuIHNtYXA%3D introduction to SMap]
* A video [https://www.youtube.com/watch?v=PYVml5MF44A&pp=ygULc2hvZGFuIHNtYXA%3D introduction to SMap] {{#ev:youtube|PYVml5MF44A|667x400}}


=== Similar Tools ===
=== Similar Tools ===

Latest revision as of 18:38, 27 September 2023

Description[edit | edit source]

SMap is a drop-in replacement for NMap which uses the same command line options and generates the same style output as NMap. The difference is SMap uses Shodan's free scanning API to gather its data, which means no actual contact with the target system(s) occurs. Since SMap uses the same command line options, you can use variable scanning speeds and host operating system (OS) detection just like you can with NMap. Additionally, only the command line flags -p, -h, -o*, and -iL are actually recognized and used. All other flags are ignored.

Tool Type[edit | edit source]

More Information[edit | edit source]