{"id":932,"date":"2024-03-22T12:01:13","date_gmt":"2024-03-22T12:01:13","guid":{"rendered":"https:\/\/hacking.cool\/?p=932"},"modified":"2024-03-22T12:04:27","modified_gmt":"2024-03-22T12:04:27","slug":"nmap-masscan-unicornscan-the-trilogy-of-network-exploration","status":"publish","type":"post","link":"https:\/\/hacking.cool\/atomanya\/nmap-masscan-unicornscan-the-trilogy-of-network-exploration\/","title":{"rendered":"Nmap, Masscan, Unicornscan: The Trilogy of Network Exploration"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"585\" src=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/29add716-5aef-47b4-8a8e-d9c28718aa9a-1024x585.webp\" alt=\"\" class=\"wp-image-944\" srcset=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/29add716-5aef-47b4-8a8e-d9c28718aa9a-1024x585.webp 1024w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/29add716-5aef-47b4-8a8e-d9c28718aa9a-300x171.webp 300w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/29add716-5aef-47b4-8a8e-d9c28718aa9a-768x439.webp 768w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/29add716-5aef-47b4-8a8e-d9c28718aa9a-1536x878.webp 1536w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/29add716-5aef-47b4-8a8e-d9c28718aa9a.webp 1792w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p class=\"has-black-color has-text-color\">Let&#8217;s dive into the intriguing world of port scanners\u2014where the digital equivalent of checking if the doors and windows are locked meets a touch of whimsy. Imagine if you will, a trio of characters in the grand digital saga: Nmap, Masscan, and Unicornscan. Each with their own quirks, talents, and party tricks, they embark on the quest to discover the open ports of the digital realm.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Nmap: The Seasoned Wizard<\/h3>\n\n\n\n<p class=\"has-black-color has-text-color\">First, we have Nmap, the seasoned wizard of the group. With its long beard and wise eyes, Nmap is the Gandalf of port scanning. It&#8217;s been around since the dawn of time (well, since 1997, which in tech years is pretty much the same thing). Nmap is versatile, powerful, and can tell you what&#8217;s behind door number one through one thousand with a flick of its staff. Need to know what services are running on your network or what operating system a remote host is using? Nmap&#8217;s got your back. But be warned, with great power comes great&#8230; verbosity. Nmap will give you all the information you need and then some. It&#8217;s the scanner that keeps on giving, whether you asked for it or not.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"585\" src=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/9114c9ed-d4cf-4325-b974-562eda880690-1024x585.webp\" alt=\"\" class=\"wp-image-940\" style=\"aspect-ratio:1.7504273504273504;width:580px\" srcset=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/9114c9ed-d4cf-4325-b974-562eda880690-1024x585.webp 1024w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/9114c9ed-d4cf-4325-b974-562eda880690-300x171.webp 300w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/9114c9ed-d4cf-4325-b974-562eda880690-768x439.webp 768w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/9114c9ed-d4cf-4325-b974-562eda880690-1536x878.webp 1536w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/9114c9ed-d4cf-4325-b974-562eda880690.webp 1792w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<ol class=\"wp-block-list\">\n<li><code>nmap 192.168.1.1<\/code> &#8211; Basic network scan of a single IP.<\/li>\n\n\n\n<li><code>nmap 192.168.1.0\/24<\/code> &#8211; Scan an entire subnet.<\/li>\n\n\n\n<li><code>nmap -p 22,80,443 192.168.1.1<\/code> &#8211; Scan specific ports on a target.<\/li>\n\n\n\n<li><code>nmap -sV 192.168.1.1<\/code> &#8211; Detect service versions on open ports.<\/li>\n\n\n\n<li><code>nmap -O 192.168.1.1<\/code> &#8211; Enable OS detection.<\/li>\n\n\n\n<li><code>nmap -A 192.168.1.1<\/code> &#8211; Aggressive scan (OS, version detection, script scanning, and traceroute).<\/li>\n\n\n\n<li><code>nmap -sS 192.168.1.1<\/code> &#8211; Perform a SYN stealth scan. (by default does the same)<\/li>\n\n\n\n<li><code>nmap -sU 192.168.1.1<\/code> &#8211; Scan UDP ports.<\/li>\n\n\n\n<li><code>nmap -F 192.168.1.1<\/code> &#8211; Fast scan (limited to 100 most common ports).<\/li>\n\n\n\n<li><code>nmap --script vuln 192.168.1.1<\/code> &#8211; Check for vulnerabilities on the target.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Masscan: The Speedy Rogue<\/h3>\n\n\n\n<p class=\"has-black-color has-text-color\">Next up, we have Masscan, the rogue of the party. Masscan wears a cloak of invisibility (not really, but it&#8217;s super fast), darting from port to port at breakneck speeds. It claims to be the fastest Internet port scanner in the land, and it&#8217;s not wrong. Masscan can scan the entire Internet in under 6 minutes if unleashed at full throttle, albeit with the right conditions and enough bandwidth. It&#8217;s like the Flash, if the Flash was really into network security. However, with great speed comes a sacrifice in detail. Masscan is all about the quick hit; it&#8217;ll tell you what&#8217;s open but doesn&#8217;t hang around to chat about it.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"585\" src=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/6d331a27-52b8-456c-a9d6-c22cff3ea1de-1024x585.webp\" alt=\"\" class=\"wp-image-939\" style=\"width:580px\" srcset=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/6d331a27-52b8-456c-a9d6-c22cff3ea1de-1024x585.webp 1024w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/6d331a27-52b8-456c-a9d6-c22cff3ea1de-300x171.webp 300w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/6d331a27-52b8-456c-a9d6-c22cff3ea1de-768x439.webp 768w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/6d331a27-52b8-456c-a9d6-c22cff3ea1de-1536x878.webp 1536w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/6d331a27-52b8-456c-a9d6-c22cff3ea1de.webp 1792w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<ol class=\"wp-block-list\">\n<li><code>masscan 192.168.1.0\/24 -p0-65535<\/code> &#8211; Scan all ports across a subnet.<\/li>\n\n\n\n<li><code>masscan -p80,443 10.0.0.0\/8 --rate=10000<\/code> &#8211; Scan large networks for specific ports at high speed.<\/li>\n\n\n\n<li><code>masscan --rate=100000 --wait 0 -p0-65535 192.168.1.1<\/code> &#8211; Ultra-fast scan of all ports on a single IP.<\/li>\n\n\n\n<li><code>masscan -pU:53,111,137,T:21-25,80,443 192.168.1.0\/24<\/code> &#8211; Scan both UDP and TCP ports.<\/li>\n\n\n\n<li><code>masscan -p80 0.0.0.0\/0 --excludefile blacklist.txt<\/code> &#8211; Scan the internet for port 80, excluding IPs listed in a file.<\/li>\n\n\n\n<li><code>masscan --banners -p80 192.168.1.0\/24<\/code> &#8211; Capture banners on port 80.<\/li>\n\n\n\n<li><code>masscan -p22 192.168.1.0\/24 --rate=500 --echo &gt; scan.conf<\/code> &#8211; Generate a configuration file for later use.<\/li>\n\n\n\n<li><code>masscan --top-ports 100 192.168.1.0\/24<\/code> &#8211; Scan the top 100 ports.<\/li>\n\n\n\n<li><code>masscan -p445 --heartbleed 192.168.1.0\/24<\/code> &#8211; Check for Heartbleed vulnerability.<\/li>\n\n\n\n<li><code>masscan --adapter-ip 192.168.1.2 --adapter-port 60000<\/code> &#8211; Specify source IP and port.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Unicornscan: The Mysterious Sorcerer<\/h3>\n\n\n\n<p class=\"has-black-color has-text-color\">Finally, we encounter Unicornscan, the mysterious sorcerer with a penchant for the arcane. Unicornscan seeks to bring an elegant, comprehensive, and high-speed approach to the world of port scanning, blending the lines between scanning and sorcery. It excels in asynchronous stateless TCP scanning, UDP scanning, and can even handle the complexities of banner grabbing and OS fingerprinting with a mystical flair. Unicornscan is like that enigmatic character in every fantasy novel that knows more than they let on, providing insights in riddles and speaking in the language of packets and protocols.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"585\" src=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/23097a51-928d-4c0a-824a-66f1a54f8ed1-1024x585.webp\" alt=\"\" class=\"wp-image-941\" style=\"width:580px\" srcset=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/23097a51-928d-4c0a-824a-66f1a54f8ed1-1024x585.webp 1024w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/23097a51-928d-4c0a-824a-66f1a54f8ed1-300x171.webp 300w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/23097a51-928d-4c0a-824a-66f1a54f8ed1-768x439.webp 768w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/23097a51-928d-4c0a-824a-66f1a54f8ed1-1536x878.webp 1536w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/23097a51-928d-4c0a-824a-66f1a54f8ed1.webp 1792w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<ol class=\"wp-block-list\">\n<li><code>unicornscan 192.168.1.1:a<\/code> &#8211; Scan all ports on a target.<\/li>\n\n\n\n<li><code>unicornscan -I 192.168.1.0\/24<\/code> &#8211; Perform a ping scan on a subnet.<\/li>\n\n\n\n<li><code>unicornscan -msf 192.168.1.1<\/code> &#8211; TCP SYN scan on all ports.<\/li>\n\n\n\n<li><code>unicornscan -mU 192.168.1.1<\/code> &#8211; UDP scan on all ports.<\/li>\n\n\n\n<li><code>unicornscan -p 80,443 192.168.1.1<\/code> &#8211; Scan specific TCP ports.<\/li>\n\n\n\n<li><code>unicornscan -i 192.168.1.1:80<\/code> &#8211; Send TCP packets to port 80.<\/li>\n\n\n\n<li><code>unicornscan -E 192.168.1.1<\/code> &#8211; Perform aggressive mode scanning.<\/li>\n\n\n\n<li><code>unicornscan -l results.txt 192.168.1.1<\/code> &#8211; Log results to a file.<\/li>\n\n\n\n<li><code>unicornscan -Dv 192.168.1.1<\/code> &#8211; Enable verbose mode with debugging.<\/li>\n\n\n\n<li><code>unicornscan -B 256 192.168.1.1<\/code> &#8211; Adjust scan bandwidth throttle.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">The Convergence<\/h3>\n\n\n\n<p class=\"has-black-color has-text-color\">So, when our three heroes converge at the round table of network security, how do they compare? Nmap, with its detailed insights and versatile toolkit, is the go-to for the detailed recon of one&#8217;s domain. It&#8217;s the wise advisor you turn to when you need to know exactly what&#8217;s lurking in the shadows.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color\">Masscan, on the other hand, is your scout, racing ahead to map the vast expanses of the network kingdom at unparalleled speeds. It&#8217;s the one you send out when time is of the essence and you need a quick lay of the land.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color\">And Unicornscan? It&#8217;s the wildcard, blending speed with a touch of thoroughness, capable of revealing the unseen with a flair for the dramatic. It&#8217;s the tool for those who walk the line between the need for speed and the desire for depth.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color\">Together, they form the ultimate fellowship of port scanning, each with its own role and specialty. Whether you&#8217;re a network wizard, a speed demon, or a seeker of mysteries, there&#8217;s a scanner in this trio for you. Just remember, with great scanning power comes great responsibility. Use these tools wisely, young padawan, and may the ports be ever in your favor.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Let&#8217;s dive into the intriguing world of port scanners\u2014where the digital equivalent of checking if the doors and windows are locked meets a touch of whimsy. Imagine if you will, a trio of characters in the grand digital saga: Nmap, Masscan, and Unicornscan. Each with their own quirks, talents, and party tricks, they embark on<span class=\"post-excerpt-end\">&hellip;<\/span><\/p>\n<p class=\"more-link\"><a href=\"https:\/\/hacking.cool\/atomanya\/nmap-masscan-unicornscan-the-trilogy-of-network-exploration\/\" class=\"themebutton\">Read More<\/a><\/p>\n","protected":false},"author":3,"featured_media":944,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-932","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Nmap, Masscan, Unicornscan: The Trilogy of Network Exploration - hacking.cool<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hacking.cool\/atomanya\/nmap-masscan-unicornscan-the-trilogy-of-network-exploration\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nmap, Masscan, Unicornscan: The Trilogy of Network Exploration - hacking.cool\" \/>\n<meta property=\"og:description\" content=\"Let&#8217;s dive into the intriguing world of port scanners\u2014where the digital equivalent of checking if the doors and windows are locked meets a touch of whimsy. Imagine if you will, a trio of characters in the grand digital saga: Nmap, Masscan, and Unicornscan. Each with their own quirks, talents, and party tricks, they embark on&hellip;Read More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hacking.cool\/atomanya\/nmap-masscan-unicornscan-the-trilogy-of-network-exploration\/\" \/>\n<meta property=\"og:site_name\" content=\"hacking.cool\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-22T12:01:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-22T12:04:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/29add716-5aef-47b4-8a8e-d9c28718aa9a.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1792\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Atom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Atom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/#website\",\"url\":\"https:\/\/hacking.cool\/atomanya\/\",\"name\":\"hacking.cool\",\"description\":\"is the hacking school \ud83d\udc69\ud83c\udffb\u200d\ud83d\udcbb\ud83e\uddd1\ud83c\udffb\u200d\ud83d\udcbb\ud83d\uddfa\ud83d\udcda\ud83d\udcd6\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hacking.cool\/atomanya\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/nmap-masscan-unicornscan-the-trilogy-of-network-exploration\/#primaryimage\",\"url\":\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/29add716-5aef-47b4-8a8e-d9c28718aa9a.webp\",\"contentUrl\":\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/29add716-5aef-47b4-8a8e-d9c28718aa9a.webp\",\"width\":1792,\"height\":1024},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/nmap-masscan-unicornscan-the-trilogy-of-network-exploration\/\",\"url\":\"https:\/\/hacking.cool\/atomanya\/nmap-masscan-unicornscan-the-trilogy-of-network-exploration\/\",\"name\":\"Nmap, Masscan, Unicornscan: The Trilogy of Network Exploration - hacking.cool\",\"isPartOf\":{\"@id\":\"https:\/\/hacking.cool\/atomanya\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hacking.cool\/atomanya\/nmap-masscan-unicornscan-the-trilogy-of-network-exploration\/#primaryimage\"},\"datePublished\":\"2024-03-22T12:01:13+00:00\",\"dateModified\":\"2024-03-22T12:04:27+00:00\",\"author\":{\"@id\":\"https:\/\/hacking.cool\/atomanya\/#\/schema\/person\/804a839cfa61d89d69fb2cf1d2f0adc2\"},\"breadcrumb\":{\"@id\":\"https:\/\/hacking.cool\/atomanya\/nmap-masscan-unicornscan-the-trilogy-of-network-exploration\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hacking.cool\/atomanya\/nmap-masscan-unicornscan-the-trilogy-of-network-exploration\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/nmap-masscan-unicornscan-the-trilogy-of-network-exploration\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/hacking.cool\/atomanya\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Nmap, Masscan, Unicornscan: The Trilogy of Network Exploration\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/#\/schema\/person\/804a839cfa61d89d69fb2cf1d2f0adc2\",\"name\":\"Atom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ac4d05ec7d617e7f2dee5855900a855a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ac4d05ec7d617e7f2dee5855900a855a?s=96&d=mm&r=g\",\"caption\":\"Atom\"},\"url\":\"https:\/\/hacking.cool\/atomanya\/author\/atom\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nmap, Masscan, Unicornscan: The Trilogy of Network Exploration - hacking.cool","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hacking.cool\/atomanya\/nmap-masscan-unicornscan-the-trilogy-of-network-exploration\/","og_locale":"en_US","og_type":"article","og_title":"Nmap, Masscan, Unicornscan: The Trilogy of Network Exploration - hacking.cool","og_description":"Let&#8217;s dive into the intriguing world of port scanners\u2014where the digital equivalent of checking if the doors and windows are locked meets a touch of whimsy. Imagine if you will, a trio of characters in the grand digital saga: Nmap, Masscan, and Unicornscan. Each with their own quirks, talents, and party tricks, they embark on&hellip;Read More","og_url":"https:\/\/hacking.cool\/atomanya\/nmap-masscan-unicornscan-the-trilogy-of-network-exploration\/","og_site_name":"hacking.cool","article_published_time":"2024-03-22T12:01:13+00:00","article_modified_time":"2024-03-22T12:04:27+00:00","og_image":[{"width":1792,"height":1024,"url":"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/29add716-5aef-47b4-8a8e-d9c28718aa9a.webp","type":"image\/webp"}],"author":"Atom","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Atom","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/hacking.cool\/atomanya\/#website","url":"https:\/\/hacking.cool\/atomanya\/","name":"hacking.cool","description":"is the hacking school \ud83d\udc69\ud83c\udffb\u200d\ud83d\udcbb\ud83e\uddd1\ud83c\udffb\u200d\ud83d\udcbb\ud83d\uddfa\ud83d\udcda\ud83d\udcd6","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hacking.cool\/atomanya\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hacking.cool\/atomanya\/nmap-masscan-unicornscan-the-trilogy-of-network-exploration\/#primaryimage","url":"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/29add716-5aef-47b4-8a8e-d9c28718aa9a.webp","contentUrl":"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/29add716-5aef-47b4-8a8e-d9c28718aa9a.webp","width":1792,"height":1024},{"@type":"WebPage","@id":"https:\/\/hacking.cool\/atomanya\/nmap-masscan-unicornscan-the-trilogy-of-network-exploration\/","url":"https:\/\/hacking.cool\/atomanya\/nmap-masscan-unicornscan-the-trilogy-of-network-exploration\/","name":"Nmap, Masscan, Unicornscan: The Trilogy of Network Exploration - hacking.cool","isPartOf":{"@id":"https:\/\/hacking.cool\/atomanya\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hacking.cool\/atomanya\/nmap-masscan-unicornscan-the-trilogy-of-network-exploration\/#primaryimage"},"datePublished":"2024-03-22T12:01:13+00:00","dateModified":"2024-03-22T12:04:27+00:00","author":{"@id":"https:\/\/hacking.cool\/atomanya\/#\/schema\/person\/804a839cfa61d89d69fb2cf1d2f0adc2"},"breadcrumb":{"@id":"https:\/\/hacking.cool\/atomanya\/nmap-masscan-unicornscan-the-trilogy-of-network-exploration\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hacking.cool\/atomanya\/nmap-masscan-unicornscan-the-trilogy-of-network-exploration\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/hacking.cool\/atomanya\/nmap-masscan-unicornscan-the-trilogy-of-network-exploration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/hacking.cool\/atomanya\/"},{"@type":"ListItem","position":2,"name":"Nmap, Masscan, Unicornscan: The Trilogy of Network Exploration"}]},{"@type":"Person","@id":"https:\/\/hacking.cool\/atomanya\/#\/schema\/person\/804a839cfa61d89d69fb2cf1d2f0adc2","name":"Atom","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hacking.cool\/atomanya\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ac4d05ec7d617e7f2dee5855900a855a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac4d05ec7d617e7f2dee5855900a855a?s=96&d=mm&r=g","caption":"Atom"},"url":"https:\/\/hacking.cool\/atomanya\/author\/atom\/"}]}},"jetpack_featured_media_url":"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/29add716-5aef-47b4-8a8e-d9c28718aa9a.webp","_links":{"self":[{"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/posts\/932","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/comments?post=932"}],"version-history":[{"count":10,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/posts\/932\/revisions"}],"predecessor-version":[{"id":947,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/posts\/932\/revisions\/947"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/media\/944"}],"wp:attachment":[{"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/media?parent=932"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/categories?post=932"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/tags?post=932"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}