ZMap is an open-source network scanner that enables researchers to quickly perform large-scale studies of the configuration of the Internet.
It was developed by Zakir Durumeric, Eric Wustrow, and J. Alex Halderman and is designed to perform comprehensive and fast network scans.
Unfortunately, even tho is freely available on-line, this tool is licensed to the University of Michigan.
ZMap is particularly known for its ability to scan the entire IPv4 address space in a short period.
With the right connection, available to most people, we talk of 45 minutes of work, if you can have a 10gigE connection and PF_RING you can scan the whole internet in about 5 minutes.
This ability makes it a valuable tool for security researchers (and not only).
It is commonly used to identify vulnerable or misconfigured devices on the Internet.
A very important piece of information/note
Please keep in mind that by running ZMap, you are potentially scanning the ENTIRE IPv4 address space and some users may not appreciate your scanning.
How to get it
The official website of ZMap is https://zmap.io/ and i advice you to check it out. There are a few of interesting things !
But more details on it’s GitHub page reachable at https://github.com/zmap/zmap
How to Install and use it
ZMap works on GNU/Linux, macOS, and BSD..
The latest stable version are available in almost all the package managers.
So just use your apt/yum/pacman/brew/emerge/port to install zmap
If you want something different (like building from source because you have nothing better to do) feel free to reach out the GitHub reported above.
By default, ZMap will perform a TCP SYN scan on the specified port at the maximum rate possible.
A more humane way to scan 10,000 random addresses on port 80 at a maximum 10 Mbps can be run as follows:
$ zmap --bandwidth=10M --target-ports=80 --max-targets=10000 --output-file=results.csv
As always,
show some love to the Authors and leave them a star on their GitHub page !
My husband is so fast too !
Hahahahaha thanks for the laugh !