<description>&lt;p&gt;In this segment, we will explore some pretty awesome tools for scanning the Internet, with a focus on network edge devices. We'll bring it all together with Claude Code and look at some sample results. Tools include:&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;strong&gt;Shodan&lt;/strong&gt; | Passive recon — query existing scan data for exposed devices, services, and vulns | Passive (API) | Instant (no packets sent)&lt;/li&gt; &lt;li&gt;&lt;strong&gt;ZMap&lt;/strong&gt; | Host discovery — find live hosts with open ports | L4 (TCP SYN, UDP, ICMP) | Millions of packets/sec&lt;/li&gt; &lt;li&gt;&lt;strong&gt;ZGrab2&lt;/strong&gt; | Application-layer handshakes — grab banners, certs, headers | L7 (30+ protocol modules) | Thousands of hosts/sec&lt;/li&gt; &lt;li&gt;&lt;strong&gt;Nerva&lt;/strong&gt; | Service fingerprinting — identify 140+ protocols with metadata, CPEs, technology stacks | L7 (TCP, UDP, SCTP) | Fast, concurrent&lt;/li&gt; &lt;li&gt;&lt;strong&gt;Nuclei&lt;/strong&gt; | Template-based vulnerability scanning — default creds, exposed panels, known CVEs | L7 (HTTP, network) | Hundreds of targets/min&lt;/li&gt; &lt;li&gt;&lt;strong&gt;Shannon&lt;/strong&gt; | Vulnerability exploitation — AI-powered whitebox pentesting of web apps | Application | ~1-1.5 hrs per target&lt;/li&gt; &lt;li&gt;&lt;strong&gt;edgescan.py&lt;/strong&gt; | Automated pipeline — orchestrates all tools above into a single command | Orchestration | End-to-end&lt;/li&gt; &lt;/ul&gt; &lt;p&gt;Visit &lt;a rel="noopener" target="_blank" href= "https://www.securityweekly.com/psw"&gt;https://www.securityweekly.com/psw&lt;/a&gt; for all the latest episodes!&lt;/p&gt; &lt;p&gt;Show Notes: &lt;a rel="noopener" target="_blank" href= "https://securityweekly.com/psw-919"&gt;https://securityweekly.com/psw-919&lt;/a&gt;&lt;/p&gt;</description>

Paul's Security Weekly (Audio)

Security Weekly Productions

Scanning The Internet with Linux Tools - PSW #919

MAR 26, 202663 MIN
Paul's Security Weekly (Audio)

Scanning The Internet with Linux Tools - PSW #919

MAR 26, 202663 MIN

Description

In this segment, we will explore some pretty awesome tools for scanning the Internet, with a focus on network edge devices. We'll bring it all together with Claude Code and look at some sample results. Tools include: Shodan | Passive recon — query existing scan data for exposed devices, services, and vulns | Passive (API) | Instant (no packets sent) ZMap | Host discovery — find live hosts with open ports | L4 (TCP SYN, UDP, ICMP) | Millions of packets/sec ZGrab2 | Application-layer handshakes — grab banners, certs, headers | L7 (30+ protocol modules) | Thousands of hosts/sec Nerva | Service fingerprinting — identify 140+ protocols with metadata, CPEs, technology stacks | L7 (TCP, UDP, SCTP) | Fast, concurrent Nuclei | Template-based vulnerability scanning — default creds, exposed panels, known CVEs | L7 (HTTP, network) | Hundreds of targets/min Shannon | Vulnerability exploitation — AI-powered whitebox pentesting of web apps | Application | ~1-1.5 hrs per target edgescan.py | Automated pipeline — orchestrates all tools above into a single command | Orchestration | End-to-end Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-919