Rust Scan Scanning Methods

Gokul
2 min readMar 14, 2023

Port Scanning

The technique of locating open ports on the web server is known as port scanning. There are times when operating an unusual port on the server can result in breaches.When compared to Nmap, RustScan is the tool that guarantees the quickest result retrieval.

Speed of Rust

With the tool RustScan, a 17-minute Nmap scan may be completed in just 19 seconds. The GitHub platform accepts the RustScan tool, which was written in that language.

Tool Description

The RustScan tool is open-source and cost-free to use. Compared to other programmes, the RustScan utility can scan 65k ports in less than 7–8 seconds.

The IPv6 Version IP is supported by the RustScan utility.

I have already wrote an blog “In that i explained how to install and some of the commands”

Here it is an link : https://medium.com/@gokulelango1040/how-install-rustscan-in-kalilinux-5da3663d33b7

Here i will list only the commands not an theory session </

Basic format for RustScan is rustscan -r ports -a <Target-ip> — <nmap cmds>

Multiple IP Scanning

rustscan -a 127.0.0.1,0.0.0.0

Host Scanning

rustscan -a www.google.com, 127.0.0.1
//Output
Open 216.58.210.36:1
Open 216.58.210.36:80
Open 216.58.210.36:443
Open 127.0.0.1:53
Open 127.0.0.1:631

CIDR support

➜ rustscan -a 192.168.0.0/30

Hosts file as input

Add the below content and named as host.txt

192.168.0.1
192.168.0.2
google.com
192.168.0.0/30
127.0.0.1

The Argument for this method rustscan -a 'hosts.txt'

Individual Port Scanning

Total number of port is 65535.The are not an physical port.The ports are used by any services like HTTP ,DNS ,TelNet Like that.

➜ rustscan -a 127.0.0.1 -p 53

Multiple selected port scanning

➜ rustscan -a 127.0.0.1 -p 53,80,121,65535

Ranges of ports

➜ rustscan -a 127.0.0.1 --range 1-1000

Adjusting the Nmap arguments

rustscan -a 127.0.0.1 -- -A -sC
//The above command is same as below
To run: nmap -Pn -vvv -p $PORTS -A -sC 127.0.0.1

Random Port Ordering

➜ rustscan -a 127.0.0.1 --range 1-1000 --scan-order "Random"

Short Keys

Short key values to extract information from the server.The below mentioned characters are used to do some operations

1. To Access Help Menu “Rustscan -h”

2. Change to quiet mode “Rustscan -q”

3. scan for a particular Range “ -r ” mention after the IP address

4. To find out RustScan’s version “ -v ”

5. To select batch size “ -b ”

6. To set Timeout value “ -t ”

Thank you for your valuable time to spend in my article !!!

--

--

Gokul

Cybersecurity Enthusiast | Smart India Hackathon |TN Police Hackathon Finalist | Linux | WebApp Penetration Tester | CCNA |Intern At Coimbatore CyberCrime Dept