Scan your whole LAN (Local Area Network) With One Command


Imagine scanning the LAN (Local Area Network) network with one command line. Now coming to this tool Null scan, it’s a Network scanning tool. We can use this tool for scanning the network and websites. This tool is built-in python language and this tool can be used in first stage of penetration testing.


  • OS: Kali Linux 2019.3 64 bits
  • Kernel version: 5.2.0

Installation Steps

root@kali:/home/iicybersecurity# git clone
Cloning into 'nullscan'...
remote: Enumerating objects: 283, done.
remote: Counting objects: 100% (283/283), done.
remote: Compressing objects: 100% (159/159), done.
remote: Total 283 (delta 133), reused 270 (delta 120), pack-reused 0
Receiving objects: 100% (283/283), 1.16 MiB | 131.00 KiB/s, done.
Resolving deltas: 100% (133/133), done.
  • Use the cd command to enter into the nullscan directory.
root@kali:/home/iicybersecurity# cd nullscan/
  • Now, install the requirements by typing this command pip install -r docs/requirements.txt
  • Use this command to give the permission to file
    • chmod +x
  • Now use this command to install the tool
    • ./ install
Tools Install
  • Next, use this command to find the help options.
    • nullscan -H
Help Fig 1
Help Fig 2
  • Now, use this command to scan your LAN Network by specifying the range.
  • nullscan -t ‘’ -i ‘tcp=ssh,http’ -r -I ‘hydra_ssh,crack_http_auth’
    • -t scan the network by using Nmap tool
    • -i include modes
    • -I include tools
    • -r generate HTML Report
Network Scan
  • Here scanning is completed using the Nmap tool, TCP modes and we can see the results in reports directory.
  • Use the ls command to view the directory.
Report Files
  • This tool scans whole network range we specified and displays all open ports on all IP’s.  
  • In the above picture, we see results (results.gnmap, results.nmap, and results.xml)
  • In the results.gnmap show all IPs in the LAN with their status and open ports.
Network Results

URL Mode

  • In this tool, we have URL mode.
  • For testing, we will run DVWA as victim web server:
  • Now we will enter the target URL in NullScan. This mode scans the website and generates a report.
  • Use this command to scan website running in DVWA.
  • nullscan -u ‘’ -i ‘tcp=ssh,http’ -r -I ‘hydra_ssh,crack_http_auth’
Web Mode Scan
  • Use ls command to view the report.
Report Files
  • It also generates an HTML report. There we can view the complete results.
Web Mode Results Fig 1
  • Here, we see the complete web.default results with different modes.
  • Now, we show some unique information about target web site
Web Mode Results Fig 2

In the above picture we see some unique results of port status, services about the target.


This tool can scan Complete LAN network by using single command. This tool is quite useful for all IT Admin to quickly scan their network for vulnerabilities. We can execute this tool in less time with more results.