Basic Scan
Perform a basic Rustscan against target IP 10.11.12.1 using default settings.
Write your command in the terminal and check results.
If your command is successful, a completion flag will be displayed!
💡 Hint: Rustscan's basic scan syntax isrustscan -a ${target} .
Check open ports in the output.
Single Port
Scan the port 443 on target 10.11.12.1 using Rustscan.
Use the appropriate flag to specify ports.
💡 Hint: Check documentation for port specification syntax (userustscan -h for help)
Multiple Ports
This time, we'll do the same thing with multiple ports! Scan the ports 80,22,8080 on the target 10.11.12.1 using Rustscan.
Run your scan with
Use the same flag to specify ports.
💡 Hint: Check documentation for port specification syntax (userustscan -h for help)
Port Range
Specifying multiple ports on rustscan is fairly easy. Now let's scan a port range together! Scan the ports from 20 to 1200 on the target 10.11.12.1.
Use the appropriate flag to specify ports.
💡 Hint: It might require a specific parameter... (userustscan -h for help)
Version Scan
Now that we are done with the basics, let's move on
to something a bit more complex!
Perform a classic rustscan ports scan on the host 10.11.12.1 but add nmap's version scan (banner grabbing) to the parameters.
💡 Hint: Use-- followed by nmap parameters.
UDP Scan
Perform a UDP scan for port 53 on 10.11.12.12 and run the nmap dns-service-discovery script using Rustscan+Nmap integration.
💡 Hint: You should know every parameter required for this!
Configuration
Finally, it's time you learn about .rustscan.toml files.
Using
Then, using the tool's wiki, write a configuration file to scan the hosts 10.11.12.1 and 10.11.12.3 leave the ports by default (do not include them in your toml file) and add the
Once your configuration is done, run
💡 Hint: currently, it seems that the example provided by the wiki is not working correctly, if you need to specify ports for later, useports = { 80 = 1, 443 = 1, 8080 = 1} if you encounter such issues!
hack.courses