Bscan is a command-line utility to perform active information gathering and service enumeration.
At its core, bscan asynchronously spawns processes of well-known scanning utilities, repurposing scan results into highlighted console output and a well-defined directory structure.
Also Read : Bincat : Binary Code Static Analyser With IDA Integration
Installation
It was written to be run on Kali Linux, but there is nothing inherently preventing it from running on any OS with the appropriate tools installed. There’s a few different types of packaged releases and ways to install them.
The easiest way to get up and running is to install the appropriate single-file executable version of the program for your operating system (no Python installation required):
on Linux (i.e., Kali)
wget -O bscan https://releases.brianwel.ch/bscan/linux
on Windows
powershell -c “[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; wget ‘https://releases.brianwel.ch/bscan/windows’ -OutFile ‘bscan.exe'”
to download a specific version, use the following pattern
wget -O bscan https://releases.brianwel.ch/github/bscan/linux/0.1.4
You can also download the latest packaged version from PyPI (note that this requires an existing Python 3.6+ installation);
pip install bscan
Similarly, you could get the bleeding-edge version from version control:
pip install https://github.com/welchbj/bscan/archive/master.tar.gz
Basic Usage
bscan has a wide variety of configuration options which can be used to tune scans to your needs. Here’s a quick example:
$ bscan \
–max-concurrency 3 \
–patterns [Mm]icrosoft \
–status-interval 10 \
–verbose-status \
scanme.nmap.org
What’s going on here?
bscan also relies on some additional configuration files. The default files can be found in the bscan/configuation directory and serve the following purposes:
Detailed Options
Here’s what you should see when running bscan –help:
usage: bscan [OPTIONS] targets
an asynchronous service enumeration tool
positional arguments:
targets the targets and/or networks on which to perform enumeration
optional arguments:
-h, –help show this help message and exit
–brute-pass-list F filename of password list to use for brute-forcing
–brute-user-list F filename of user list to use for brute-forcing
–cmd-print-width I the maximum integer number of characters allowed when printing the command used to spawn a running subprocess (defaults to 80)
–config-dir D the base directory from which to load the configuration files; required configuration files missing from this directory will instead be loaded from the default files shipped with this program
–hard force overwrite of existing directories
–max-concurrency I maximum integer number of subprocesses permitted to be running concurrently (defaults to 20)
–no-program-check disable checking the presence of required system programs
–no-file-check disable checking the presence of files such as configured wordlists
–no-service-scans disable running scans on discovered services
–output-dir D the base directory in which to write output files
–patterns [ [ …]] regex patterns to highlight in output text
–ping-sweep enable ping sweep filtering of hosts from a network range before running more intensive scans
–quick-only whether to only run the quick scan (and not include the thorough scan over all ports)
–qs-method S the method for performing the initial TCP port scan; must correspond to a configured port scan
–status-interval I integer number of seconds to pause in between printing status updates; a non-positive value disables updates (defaults to 30)
–ts-method S the method for performing the thorough TCP port scan; must correspond to a configured port scan
–udp whether to run UDP scans
–udp-method S the method for performing the UDP port scan; must correspond to a configured port scan
–verbose-status whether to print verbose runtime status updates, based on frequency specified by --status-interval
flag
–version program version
–web-word-list F the wordlist to use for scans
Kali Linux 2024.4, the final release of 2024, brings a wide range of updates and…
This Go program applies a lifetime patch to PowerShell to disable ETW (Event Tracing for…
GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory…
Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders…
The free and open-source security platform SecHub, provides a central API to test software with…
Don't worry if there are any bugs in the tool, we will try to fix…