A compilation of network scanning strategies to find vulnerable devices
Active Scanning Techniques
This repository is a collection of different techniques in order to find specific hosts (with IPv4 and IPv6 addresses) to scan. The goal is to document the available techniques and improve the scanning for defenders.
Why this collection?
Finding vulnerable devices can be challenging for CSIRTs (waiting for the next scan in Shodan, Censys).
Finding the scope of the scan (regional versus global, wrong IRR allocation).
Discovering newly devices exposed without scanning the whole IPv4 space.
Discovering named-based services (many services are based on name such as HTTP virtual-host, TLS SNI).
Discovering newly exposed devices or services using IPv6 addresses.