-
IPv4, IPv6 compatible.
-
IPv6 auto discover mode
-
Input range, file-list support
-
Extremly fast scan
-
Requirement: Windows Vista and later or Windows Server 2008 and later, WinPcap 4.1.3 https://www.winpcap.org/install/default.htm
- Usage: WannaCry_NotPetya_FastDetect [-h] [-noARP] [-a6]
-
[-f file-name]
-
[-t6 single-IPv6]
-
[-t4 single-IPv4 / range-of-IPv4 / netmask]
-
[-n number-of-threads]
-
'-h' --- Help.
-
'-a6' --- Auto mode. Scanning only IPv6 network addresses (in this case is used ICMPv6 Multicast Echo Request).
-
'-f' --- File mode. Use input file with IPv4 and IPv6 addresses written in a column.
-
'-t6' --- IPv6 mode. Use only single IPv6 address. Examples: fe80::fdba:4364:7f82:a4cd
-
'-t4' --- IPv4 mode. Examples: 192.168.0.123 or 10.0.123.0/24 or 192.168.0.1-192.168.0.50.
-
'-n' --- Number of threads for vuln detect scanning. Optional. Default: 3.
-
'-noARP' --- Do not use ARP scanning for local network. Optional.
-
- Example:
- WannaCry_NotPetya_FastDetect .exe -t4 192.168.0.1 -n 1
- WannaCry_NotPetya_FastDetect .exe -t4 192.168.0.0/24 -n 8
- WannaCry_NotPetya_FastDetect .exe -t4 192.168.0.1-192.168.0.50
- WannaCry_NotPetya_FastDetect FastDetect.exe -t6 fe80::fdba:4364:7f82:a4cd
- WannaCry_NotPetya_FastDetect .exe -a6
- WannaCry_NotPetya_FastDetect .exe -f C:\Work\IpListSeparetedWithNewLine.txt