Information Security

Defending the digital infrastructure

iSTOCK/GETTY IMAGES

Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Dan Kaminsky updates scanrand free IP port scanner

The scanrand 2.0 IP port scanner uses a SQL database for more detailed mining and temporal field, according to creator Dan Kaminsky

Look out Nmap and Nessus, Dan Kaminsky continues to refine his stateless scanrand auditing tool -- making it fast and efficient.

Kaminsky, a security strategist at Avaya, built the freeware tool to reap the wealth of information about networked devices contained in IP packets. By flooding a network with simple requests, scanrand prompts a return of data about a network's topology and population.

"Networks have the capacity to throw a lot of packets around, so let's use that to identify what's out there quickly," Kaminsky explains.

Scanrand was built for speed, able to scan roughly 65,000 IP addresses in a private network in about four seconds.

In scanrand 2.0, Kaminsky pipes the raw data into a SQL database, through which users can easily organize and parse the data into actionable intelligence. For instance, users can not only discover a rogue machine on their network, but also see the pathways feeding it and the machine's open ports.

"You now have more detailed data mining on a more temporal field," Kaminsky says. "I have a vision that scanrand can do more network port discovery and network fingerprinting."

The fundamental problem scanrand addresses is network discovery without the invasiveness and bandwidth consumption of conventional scanners. Refining the data analysis, Kaminsky says, will give enterprises the ability to know how their network is changing and to better address routing, resource and security issues.

"This opens up new avenues that networking can be done," says Kaminsky, who's developing scanrand through his private site, DoxPara.com. "It increases the fluidity of enterprises' data."

Article 11 of 12
This was last published in December 2003

Dig Deeper on Real-time network monitoring and forensics

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Sounds impressive (if you aren't running a port scanner: start) - but a little googling shows me the tool is distributed in source code form and needs to be compiled by OS - and assuming a unix-y history. So - it sounds like the author has some work to do to reach mass market.
Cancel

Get More Information Security

Access to all of our back issues View All

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close