{"id":681,"date":"2018-06-11T17:00:44","date_gmt":"2018-06-11T11:30:44","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=681"},"modified":"2022-12-17T15:13:17","modified_gmt":"2022-12-17T15:13:17","slug":"unicornscan","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/unicornscan\/","title":{"rendered":"Unicornscan &#8211; Network Scanning Tool to Find the Open Ports"},"content":{"rendered":"\n<p>Unicornscan is an asynchronous network stimulus delivery\/response recording tool. Meaning it sends out broken\/unorganized\/fragmented packets (without a regular pattern unlike other port scanning tools) to a host and waits for the target\u2019s response.<\/p>\n\n\n\n<p>After getting the response the TTL value is calculated for each port and thereby identifying the operating system. For eg, if the ttl=128, the operating system is Windows and so on.<\/p>\n\n\n\n<p>Pentesters use this tool when regular port scanning doesn\u2019t work as the target might have enabled port scanning detection or has enabled IDS\/IPS or honeypots.&nbsp;One cool feature of unicornscan is that it uses different threads to send out packets &amp; to receive them, unlike other port scanners.<\/p>\n\n\n\n<p><span style=\"color: #ff0000;\">Note: This tool is not available by default in Kali Sana<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Options<\/h2>\n\n\n\n<pre class=\"wp-block-preformatted\">Syntax: Unicornscan &lt;options&gt; &lt;target&gt;<\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\">-b, --broken-crc&nbsp;&nbsp;&nbsp;&nbsp; *set broken crc sums on [T]ransport layer, [N]etwork layer, or both[TN]\n-B, --source-port&nbsp;&nbsp;&nbsp; *set source port? or whatever the scan module expects as a number-c, --proc-duplicates process duplicate replies\n-d, --delay-type&nbsp;&nbsp;&nbsp;&nbsp; *set delay type (numeric value, valid options are `1:tsc 2:gtod 3:sleep')\n-D, --no-defpayload&nbsp;&nbsp; no default Payload, only probe known protocols\n-e, --enable-module&nbsp; *enable modules listed as arguments (output and report currently)\n-E, --proc-errors&nbsp;&nbsp;&nbsp;&nbsp; for processing `non-open' responses (icmp errors, tcp rsts...)\n-F, --try-frags\n-G, --payload-group&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *payload group (numeric) for tcp\/udp type payload selection (default all)\n-h, --help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; help\n-H, --do-dns&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; resolve hostnames during the reporting phase\n-i, --interface&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *interface name, like eth0 or fxp1, not normally required\n-I, --immediate&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; immediate mode, display things as we find them\n-j, --ignore-seq&nbsp;&nbsp;&nbsp;&nbsp; *ignore `A'll, 'R'eset sequence numbers for tcp header validation\n-l, --logfile&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *write to this file not my terminal\n-L, --packet-timeout *wait this long for packets to come back (default 7 secs)\n-m, --mode&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *scan mode, tcp (syn) scan is default, U for udp T for tcp `sf' for tcp connect scan and A for arp for -mT you can also specify tcp flags following the T like -mTsFpU for example that would send tcp syn packets with (NO Syn|FIN|NO Push|URG)\n-M, --module-dir&nbsp;&nbsp;&nbsp;&nbsp; *directory modules are found at (defaults to \/usr\/lib\/unicornscan\/modules)\n-o, --format&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *format of what to display for replies, see man page for format specification\n-p, --ports&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; global ports to scan, if not specified in target options\n-P, --pcap-filter&nbsp;&nbsp;&nbsp; *extra pcap filter string for reciever\n-q, --covertness &nbsp;&nbsp;&nbsp;&nbsp;*covertness value from 0 to 255\n-Q, --quiet&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; dont use output to screen, its going somewhere else (a database say...)\n-r, --pps&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *packets per second (total, not per host, and as you go higher it gets less accurate)\n-R, --repeats&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;*repeat packet scan N times\n-s, --source-addr&nbsp;&nbsp;&nbsp; *source address for packets `r' for random\n-S, --no-shuffle&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; do not shuffle ports\n-t, --ip-ttl&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *set TTL on sent packets as in 62 or 6-16 or r64-128\n-T, --ip-tos&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *set TOS on sent packets\n-u, --debug&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *debug mask\n-U, --no-openclosed&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; dont say open or closed\n-w, --safefile&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *write pcap file of recieved packets\n-W, --fingerprint&nbsp;&nbsp;&nbsp; *OS fingerprint 0=cisco(def) 1=openbsd 2=WindowsXP 3=p0fsendsyn 4=FreeBSD 5=nmap 6=linux 7:strangetcp\n-v, --verbose&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; verbose (each time more verbose so -vvvvv is really verbose)\n-V, --version&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; display version\n-z, --sniff&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; sniff alike\n-Z, --drone-str&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *drone String\n*:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; options with `*' require an argument following them<\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">Lab 1: Scan a host for services &amp; OS(TTL)<\/h2>\n\n\n\n<p>In this lab, we scan a host with IP address 192.168.1.250 for open ports. Also by doing so, we get the TTL value of corresponding ports and thereby we can identify the operating system<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">Command: unicornscan 192.168.1.250 \u2013Iv<\/pre>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/kalilinuxtutorials.com\/ig\/unicornscan\/attachment\/unicornscan1\/#main\" rel=\"attachment wp-att-685\"><img decoding=\"async\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/unicornscan1.png\" alt=\"unicornscan\" class=\"wp-image-685\"\/><\/a><figcaption class=\"wp-element-caption\">Basic Scan<\/figcaption><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/kalilinuxtutorials.com\/ig\/unicornscan\/attachment\/unicornscan2\/#main\" rel=\"attachment wp-att-686\"><img decoding=\"async\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/unicornscan2.png\" alt=\"unicornscan\" class=\"wp-image-686\"\/><\/a><figcaption class=\"wp-element-caption\">Results<\/figcaption><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">Lab 2: Perform a TCP SYN Scan on a whole network<\/h2>\n\n\n\n<p>In this lab, we perform a TCP syn scan on a whole network range of 192.168.1.1\/24. By doing so we have multiple benefits. All the live hosts will be visible to us along with the services\/ports open &amp; TTL values.<\/p>\n\n\n\n<p>Stealth syn scan is a method by which packets with syn flags are sent to a port of a target host. If the port is open, the reply from the target will be a packet with SYN\/ACK flag else a packet with RST flag. Thus the attacker can identify what all services are running on the target host.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">Command : unicornscan -msf -v -I 192.168.1.1\/24<\/pre>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/kalilinuxtutorials.com\/ig\/unicornscan\/attachment\/unicornscan3\/#main\" rel=\"attachment wp-att-687\"><img decoding=\"async\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/unicornscan3.png\" alt=\"unicornscan\" class=\"wp-image-687\"\/><\/a><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Lab 3: Perform a UDP scan on the whole network<\/h2>\n\n\n\n<p>In this lab, we perform a UDP scan on a whole network range of 192.168.1.1\/24. By doing so we get to know all UDP services running on a network.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">Command: unicornscan \u2013mU \u2013v \u2013I 192.168.1.1\/24<\/pre>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/kalilinuxtutorials.com\/ig\/unicornscan\/attachment\/unicornscan4\/#main\" rel=\"attachment wp-att-684\"><img decoding=\"async\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/unicornscan4.png\" alt=\"unicornscan\" class=\"wp-image-684\"\/><\/a><figcaption class=\"wp-element-caption\">UDP Scan<\/figcaption><\/figure>\n<\/div>\n\n\n<p>While performing scans with unicornscan, turn ON Wireshark also to view the packets going out. You can see the pattern which unicornscan sends out. Try it &amp; Share this tutorial.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Unicornscan is an asynchronous network stimulus delivery\/response recording tool. Meaning it sends out broken\/unorganized\/fragmented packets (without a regular pattern unlike other port scanning tools) to a host and waits for the target\u2019s response. After getting the response the TTL value is calculated for each port and thereby identifying the operating system. For eg, if the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[26,41],"tags":[868,1615,1616,1776,2228,2752],"class_list":["post-681","post","type-post","status-publish","format-standard","hentry","category-ig","category-tuts","tag-discovery","tag-infogathering","tag-information-gathering","tag-kali-linux","tag-network-security","tag-recon"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Unicornscan - Network Scanning Tool to Find the Open Ports - Kali Linux Tutorials<\/title>\n<meta name=\"description\" content=\"Unicornscan is an asynchronous network stimulus delivery\/response recording tool. It sends out broken\/fragmented packets and waits in another thread.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/unicornscan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unicornscan - Network Scanning Tool to Find the Open Ports - Kali Linux Tutorials\" \/>\n<meta property=\"og:description\" content=\"Unicornscan is an asynchronous network stimulus delivery\/response recording tool. It sends out broken\/fragmented packets and waits in another thread.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/unicornscan\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-11T11:30:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-17T15:13:17+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/unicornscan1.png\" \/>\n<meta name=\"author\" content=\"Ravi Sankar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ravi Sankar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/unicornscan\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/unicornscan\/\"},\"author\":{\"name\":\"Ravi Sankar\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/fc7a437fea63fdc097205621071d5545\"},\"headline\":\"Unicornscan &#8211; Network Scanning Tool to Find the Open Ports\",\"datePublished\":\"2018-06-11T11:30:44+00:00\",\"dateModified\":\"2022-12-17T15:13:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/unicornscan\/\"},\"wordCount\":364,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/unicornscan\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/unicornscan1.png\",\"keywords\":[\"discovery\",\"infogathering\",\"information gathering\",\"kali linux\",\"network security\",\"recon\"],\"articleSection\":[\"Information Gathering\",\"Tutorials\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/unicornscan\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/unicornscan\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/unicornscan\/\",\"name\":\"Unicornscan - Network Scanning Tool to Find the Open Ports - Kali Linux Tutorials\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/unicornscan\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/unicornscan\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/unicornscan1.png\",\"datePublished\":\"2018-06-11T11:30:44+00:00\",\"dateModified\":\"2022-12-17T15:13:17+00:00\",\"description\":\"Unicornscan is an asynchronous network stimulus delivery\/response recording tool. It sends out broken\/fragmented packets and waits in another thread.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/unicornscan\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/unicornscan\/#primaryimage\",\"url\":\"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/unicornscan1.png\",\"contentUrl\":\"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/unicornscan1.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/fc7a437fea63fdc097205621071d5545\",\"name\":\"Ravi Sankar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8dfaba25f81ff33d5b8723d63285a6eaaedfef1c82c23e370efb0a3fe2054613?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8dfaba25f81ff33d5b8723d63285a6eaaedfef1c82c23e370efb0a3fe2054613?s=96&d=mm&r=g\",\"caption\":\"Ravi Sankar\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ravisankar\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Unicornscan - Network Scanning Tool to Find the Open Ports - Kali Linux Tutorials","description":"Unicornscan is an asynchronous network stimulus delivery\/response recording tool. It sends out broken\/fragmented packets and waits in another thread.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/unicornscan\/","og_locale":"en_US","og_type":"article","og_title":"Unicornscan - Network Scanning Tool to Find the Open Ports - Kali Linux Tutorials","og_description":"Unicornscan is an asynchronous network stimulus delivery\/response recording tool. It sends out broken\/fragmented packets and waits in another thread.","og_url":"https:\/\/kalilinuxtutorials.com\/unicornscan\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2018-06-11T11:30:44+00:00","article_modified_time":"2022-12-17T15:13:17+00:00","og_image":[{"url":"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/unicornscan1.png","type":"","width":"","height":""}],"author":"Ravi Sankar","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Ravi Sankar","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/unicornscan\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/unicornscan\/"},"author":{"name":"Ravi Sankar","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/fc7a437fea63fdc097205621071d5545"},"headline":"Unicornscan &#8211; Network Scanning Tool to Find the Open Ports","datePublished":"2018-06-11T11:30:44+00:00","dateModified":"2022-12-17T15:13:17+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/unicornscan\/"},"wordCount":364,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/unicornscan\/#primaryimage"},"thumbnailUrl":"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/unicornscan1.png","keywords":["discovery","infogathering","information gathering","kali linux","network security","recon"],"articleSection":["Information Gathering","Tutorials"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/unicornscan\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/unicornscan\/","url":"https:\/\/kalilinuxtutorials.com\/unicornscan\/","name":"Unicornscan - Network Scanning Tool to Find the Open Ports - Kali Linux Tutorials","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/unicornscan\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/unicornscan\/#primaryimage"},"thumbnailUrl":"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/unicornscan1.png","datePublished":"2018-06-11T11:30:44+00:00","dateModified":"2022-12-17T15:13:17+00:00","description":"Unicornscan is an asynchronous network stimulus delivery\/response recording tool. It sends out broken\/fragmented packets and waits in another thread.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/unicornscan\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/unicornscan\/#primaryimage","url":"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/unicornscan1.png","contentUrl":"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/unicornscan1.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/fc7a437fea63fdc097205621071d5545","name":"Ravi Sankar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8dfaba25f81ff33d5b8723d63285a6eaaedfef1c82c23e370efb0a3fe2054613?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8dfaba25f81ff33d5b8723d63285a6eaaedfef1c82c23e370efb0a3fe2054613?s=96&d=mm&r=g","caption":"Ravi Sankar"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ravisankar\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":32825,"url":"https:\/\/kalilinuxtutorials.com\/forensic\/","url_meta":{"origin":681,"position":0},"title":"Forensic &#8211; Detecting Hackers With PCAP Data","author":"Varshini","date":"April 23, 2024","format":false,"excerpt":"This program discusses the development of a machine learning (ML) program designed to identify specific hacking activities using forensic evidence from PCAP files, which are data files created by network analyzers like Wireshark. These files capture packet data across various layers of the Open Systems Interconnection (OSI) model, providing a\u2026","rel":"","context":"In &quot;Forensics&quot;","block_context":{"text":"Forensics","link":"https:\/\/kalilinuxtutorials.com\/category\/f\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiSGDBpoOze9WY064gT8KENJITBo4XruaUqo6KeOYVAfUeLDQnEUlO-qyHMs3HdkAlHLC3jFBW45VKuzKar9jc6A84iO0RUV8HLzaxGXvXWILK6G-IPSy9m0Ky46XhUs583coBVTCZYsd_mQ6UmqXj-avDr01Msy7nl8bTSitElNhXMTBI26SXnzGsh8_vf\/s16000\/Forensic%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiSGDBpoOze9WY064gT8KENJITBo4XruaUqo6KeOYVAfUeLDQnEUlO-qyHMs3HdkAlHLC3jFBW45VKuzKar9jc6A84iO0RUV8HLzaxGXvXWILK6G-IPSy9m0Ky46XhUs583coBVTCZYsd_mQ6UmqXj-avDr01Msy7nl8bTSitElNhXMTBI26SXnzGsh8_vf\/s16000\/Forensic%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiSGDBpoOze9WY064gT8KENJITBo4XruaUqo6KeOYVAfUeLDQnEUlO-qyHMs3HdkAlHLC3jFBW45VKuzKar9jc6A84iO0RUV8HLzaxGXvXWILK6G-IPSy9m0Ky46XhUs583coBVTCZYsd_mQ6UmqXj-avDr01Msy7nl8bTSitElNhXMTBI26SXnzGsh8_vf\/s16000\/Forensic%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiSGDBpoOze9WY064gT8KENJITBo4XruaUqo6KeOYVAfUeLDQnEUlO-qyHMs3HdkAlHLC3jFBW45VKuzKar9jc6A84iO0RUV8HLzaxGXvXWILK6G-IPSy9m0Ky46XhUs583coBVTCZYsd_mQ6UmqXj-avDr01Msy7nl8bTSitElNhXMTBI26SXnzGsh8_vf\/s16000\/Forensic%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiSGDBpoOze9WY064gT8KENJITBo4XruaUqo6KeOYVAfUeLDQnEUlO-qyHMs3HdkAlHLC3jFBW45VKuzKar9jc6A84iO0RUV8HLzaxGXvXWILK6G-IPSy9m0Ky46XhUs583coBVTCZYsd_mQ6UmqXj-avDr01Msy7nl8bTSitElNhXMTBI26SXnzGsh8_vf\/s16000\/Forensic%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiSGDBpoOze9WY064gT8KENJITBo4XruaUqo6KeOYVAfUeLDQnEUlO-qyHMs3HdkAlHLC3jFBW45VKuzKar9jc6A84iO0RUV8HLzaxGXvXWILK6G-IPSy9m0Ky46XhUs583coBVTCZYsd_mQ6UmqXj-avDr01Msy7nl8bTSitElNhXMTBI26SXnzGsh8_vf\/s16000\/Forensic%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":893,"url":"https:\/\/kalilinuxtutorials.com\/masscan\/","url_meta":{"origin":681,"position":1},"title":"How to use Masscan\u00a0to Enumerate Large Number of Hosts Quickly","author":"Ravi Sankar","date":"June 14, 2018","format":false,"excerpt":"Masscan\u00a0has been around for some time now and already it's in use by pentesters\u00a0all around. It's a reconnaissance\u00a0tool which can transmit up to 10 million packets per second. It uses asynchronous transmission & a custom TCP\/IP stack. So different threads are used for transmission & reception of packets. Masscan can\u2026","rel":"","context":"In &quot;Information Gathering&quot;","block_context":{"text":"Information Gathering","link":"https:\/\/kalilinuxtutorials.com\/category\/ig\/"},"img":{"alt_text":"masscan","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2017\/03\/masscan-16-1024x768.jpg?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2017\/03\/masscan-16-1024x768.jpg?resize=350%2C200 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2017\/03\/masscan-16-1024x768.jpg?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2017\/03\/masscan-16-1024x768.jpg?resize=700%2C400 2x"},"classes":[]},{"id":1874,"url":"https:\/\/kalilinuxtutorials.com\/warberrypi-collection-scanning-tools\/","url_meta":{"origin":681,"position":2},"title":"WarBerryPi &#8211; A Collection Of Scanning Tools  For Tactical Exploitation","author":"R K","date":"July 11, 2018","format":false,"excerpt":"WarBerryPi was built to be used as a hardware implant during red teaming scenarios where we want to obtain as much information as possible in a short period of time with being as stealth as possible. Just find a network port and plug it in. The scripts have been designed\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":32850,"url":"https:\/\/kalilinuxtutorials.com\/jin\/","url_meta":{"origin":681,"position":3},"title":"Jin &#8211; Your Hacking CLI Toolkit","author":"Varshini","date":"April 25, 2024","format":false,"excerpt":"Jin is a hacking command-line tools designed to make your scan port, gathering urls, check vulnerability and sending DDOS attack to your target. This tools is made for ethical and education purpose. I recommend you not to use this tools for harmfull action. Current Tools: scan: This tool scans a\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiUq2nANYDi5K6AdZekVGK3lzJ-ibm45mYOQra2rjcQPlIYdokLnJ7LZiBsL5SNOwFNa45AR0xXoLd06abDTxb9F_AFajV_NB4HrQY44_ol79N-6yFb46j58IC_CsRjZeK3cZKmL3sBFv3qWnQ4y4Ilj_6MdSn0QVm0j323PD2xUTN7rIf4x4Yw5_nRFv26\/s16000\/Jin%20-%20Your%20Hacking%20CLI%20Toolkit.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiUq2nANYDi5K6AdZekVGK3lzJ-ibm45mYOQra2rjcQPlIYdokLnJ7LZiBsL5SNOwFNa45AR0xXoLd06abDTxb9F_AFajV_NB4HrQY44_ol79N-6yFb46j58IC_CsRjZeK3cZKmL3sBFv3qWnQ4y4Ilj_6MdSn0QVm0j323PD2xUTN7rIf4x4Yw5_nRFv26\/s16000\/Jin%20-%20Your%20Hacking%20CLI%20Toolkit.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiUq2nANYDi5K6AdZekVGK3lzJ-ibm45mYOQra2rjcQPlIYdokLnJ7LZiBsL5SNOwFNa45AR0xXoLd06abDTxb9F_AFajV_NB4HrQY44_ol79N-6yFb46j58IC_CsRjZeK3cZKmL3sBFv3qWnQ4y4Ilj_6MdSn0QVm0j323PD2xUTN7rIf4x4Yw5_nRFv26\/s16000\/Jin%20-%20Your%20Hacking%20CLI%20Toolkit.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiUq2nANYDi5K6AdZekVGK3lzJ-ibm45mYOQra2rjcQPlIYdokLnJ7LZiBsL5SNOwFNa45AR0xXoLd06abDTxb9F_AFajV_NB4HrQY44_ol79N-6yFb46j58IC_CsRjZeK3cZKmL3sBFv3qWnQ4y4Ilj_6MdSn0QVm0j323PD2xUTN7rIf4x4Yw5_nRFv26\/s16000\/Jin%20-%20Your%20Hacking%20CLI%20Toolkit.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiUq2nANYDi5K6AdZekVGK3lzJ-ibm45mYOQra2rjcQPlIYdokLnJ7LZiBsL5SNOwFNa45AR0xXoLd06abDTxb9F_AFajV_NB4HrQY44_ol79N-6yFb46j58IC_CsRjZeK3cZKmL3sBFv3qWnQ4y4Ilj_6MdSn0QVm0j323PD2xUTN7rIf4x4Yw5_nRFv26\/s16000\/Jin%20-%20Your%20Hacking%20CLI%20Toolkit.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiUq2nANYDi5K6AdZekVGK3lzJ-ibm45mYOQra2rjcQPlIYdokLnJ7LZiBsL5SNOwFNa45AR0xXoLd06abDTxb9F_AFajV_NB4HrQY44_ol79N-6yFb46j58IC_CsRjZeK3cZKmL3sBFv3qWnQ4y4Ilj_6MdSn0QVm0j323PD2xUTN7rIf4x4Yw5_nRFv26\/s16000\/Jin%20-%20Your%20Hacking%20CLI%20Toolkit.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":21193,"url":"https:\/\/kalilinuxtutorials.com\/udp-hunter\/","url_meta":{"origin":681,"position":4},"title":"UDP-Hunter : Network Assessment Tool For Various UDP Services Covering Both IPv4 And IPv6 Protocols","author":"R K","date":"January 18, 2022","format":false,"excerpt":"UDP-Hunter is a UDP Scanning has always been a slow and painful exercise, and if you add IPv6 on top of UDP, the tool choices get pretty limited. UDP Hunter is a python based open source network assessment tool focused on UDP Service Scanning. With UDP Hunter, we have focused\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjsNzT6FGzQ9kou1NHo0ajwrC6-rc-3SMxDbidzQCgXJ5G4EpTYEC3sWY4UPb7JbrLIZ-MMscsNNZgfnecYSD7q2v1PaPF01PC39TW8h_ynGbxwySGTe_c-7W0S9Z36B7iKWtZ0la581xw8FbA2f6s1eeo2p48tcH9uampH92JafwnI-qd1RbaL4JQa=s746","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjsNzT6FGzQ9kou1NHo0ajwrC6-rc-3SMxDbidzQCgXJ5G4EpTYEC3sWY4UPb7JbrLIZ-MMscsNNZgfnecYSD7q2v1PaPF01PC39TW8h_ynGbxwySGTe_c-7W0S9Z36B7iKWtZ0la581xw8FbA2f6s1eeo2p48tcH9uampH92JafwnI-qd1RbaL4JQa=s746 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjsNzT6FGzQ9kou1NHo0ajwrC6-rc-3SMxDbidzQCgXJ5G4EpTYEC3sWY4UPb7JbrLIZ-MMscsNNZgfnecYSD7q2v1PaPF01PC39TW8h_ynGbxwySGTe_c-7W0S9Z36B7iKWtZ0la581xw8FbA2f6s1eeo2p48tcH9uampH92JafwnI-qd1RbaL4JQa=s746 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjsNzT6FGzQ9kou1NHo0ajwrC6-rc-3SMxDbidzQCgXJ5G4EpTYEC3sWY4UPb7JbrLIZ-MMscsNNZgfnecYSD7q2v1PaPF01PC39TW8h_ynGbxwySGTe_c-7W0S9Z36B7iKWtZ0la581xw8FbA2f6s1eeo2p48tcH9uampH92JafwnI-qd1RbaL4JQa=s746 2x"},"classes":[]},{"id":26011,"url":"https:\/\/kalilinuxtutorials.com\/puwr\/","url_meta":{"origin":681,"position":5},"title":"Puwr : SSH Pivoting Script For Expanding Attack Surfaces On Local Networks","author":"R K","date":"July 17, 2022","format":false,"excerpt":"Puwr will Easily expand your attack surface on a local network by discovering more hosts, via SSH. Using a machine running a SSH service, Puwr uses a given subnet range to scope out IP's, sending back any successful ping requests it has. This can be used to create a pivoting\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi9EZNGrF8-OFOhfTvzLm0YVplGg1QU9lcq6Bba_lmrnYBqPVmCB_cSS1rD9rYMwqH67UjoDnyzHqXY9tB4r1CX7r-Ad1kNF8xsAJD_qnHCqdCUOut7hKxWZWxZ7b_apZyxeiNnnPK2EAbKfo6k9r9i2qCbawygR44dKESw47EcwkPoo2N191CNeoJW\/s570\/icon%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi9EZNGrF8-OFOhfTvzLm0YVplGg1QU9lcq6Bba_lmrnYBqPVmCB_cSS1rD9rYMwqH67UjoDnyzHqXY9tB4r1CX7r-Ad1kNF8xsAJD_qnHCqdCUOut7hKxWZWxZ7b_apZyxeiNnnPK2EAbKfo6k9r9i2qCbawygR44dKESw47EcwkPoo2N191CNeoJW\/s570\/icon%20%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi9EZNGrF8-OFOhfTvzLm0YVplGg1QU9lcq6Bba_lmrnYBqPVmCB_cSS1rD9rYMwqH67UjoDnyzHqXY9tB4r1CX7r-Ad1kNF8xsAJD_qnHCqdCUOut7hKxWZWxZ7b_apZyxeiNnnPK2EAbKfo6k9r9i2qCbawygR44dKESw47EcwkPoo2N191CNeoJW\/s570\/icon%20%281%29.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=681"}],"version-history":[{"count":1,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/681\/revisions"}],"predecessor-version":[{"id":28010,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/681\/revisions\/28010"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}