📌 Purpose
Learn how to use Unicornscan — a high-performance asynchronous port scanner — for advanced network reconnaissance, stealth scans, and OS fingerprinting. Includes real command outputs, PCAP logging, and a full lab scenario.
🚀 Introduction
When you need blazing-fast port scans, TTL-based OS detection, or stealthy TCP/UDP reconnaissance, Unicornscan shines. Included in Kali Linux, this powerful tool delivers performance Nmap sometimes can’t match on large-scale or noisy networks.
In this guide, we’ll cover:
- âś… How Unicornscan works
- âś… Real usage examples with output
- âś… A practical scenario with analysis
đź”§ Installation & Setup
Unicornscan is preinstalled in Kali Linux. But to verify or reinstall:
sudo apt update
sudo apt install unicornscan -y
unicornscan --version
To view all options:
unicornscan -h
đź§Ş Scan Syntax & Modes
Basic Format:
unicornscan [options] <target[:ports]>
Option | Description |
---|---|
-mT |
TCP scan |
-mU |
UDP scan |
-r <rate> |
Packets/sec (stealth/speed tuning) |
-I |
Immediate display (streamed output) |
-v |
Verbose |
-eosdetect |
TTL-based OS detection |
-w |
Save responses to PCAP |
⚡ Common Scan Examples (with Output)
🔹 1. Basic TCP SYN Scan
sudo unicornscan 172.16.215.132
📥 Output:
TCP open http[ 80] from 172.16.215.132 ttl 128
TCP open epmap[ 135] from 172.16.215.132 ttl 128
TCP open netbios-ssn[ 139] from 172.16.215.132 ttl 128
TCP open microsoft-ds[ 445] from 172.16.215.132 ttl 128
đź§ Insight: Host is running Windows services like NetBIOS and SMB.
🔹 2. UDP Port Check
sudo unicornscan -mU -r200 -I 192.168.100.1:53
📥 Output:
UDP open domain[ 53] from 192.168.100.1 ttl 128
đź§ Insight: DNS service active on UDP port 53.
🔹 3. Multi-Port Subnet Scan
sudo unicornscan -r500 -mT 192.168.100.1/24:80,443,445,339
📥 Output (sample):
TCP open http[ 80] from 192.168.100.5 ttl 64
TCP open microsoft-ds[ 445] from 192.168.100.5 ttl 128
đź§ Insight: Host is dual-serving HTTP and SMB.
🔹 4. TCP + OS Detection + Logging
sudo unicornscan -r200 -Iv -eosdetect -mT 172.16.215.1:3306,80,443
📥 Output:
TCP open 172.16.215.1:80 ttl 64
TCP open 172.16.215.1:3306 ttl 64
OS `Linux'
đź§ Insight: Detected MySQL and web server; TTL suggests a Linux host.
🧑‍💻 Real-World Scenario: Internal Reconnaissance
🎯 Goal
Identify web, SSH, and MySQL services in 192.168.50.0/24
, store logs for analysis, and detect operating systems.
đź§µ Command
sudo unicornscan -r300 -Iv -eosdetect -mT 192.168.50.0/24:22,80,443,3306 -w scan_results.pcap
-r300
→ Control scan speed-eosdetect
→ TTL-based OS guessing-w
→ Save PCAP for Wireshark
📥 Sample Output:
TCP open 192.168.50.10:22 ttl 64 OS `Linux'
TCP open 192.168.50.10:80 ttl 64 OS `Linux'
TCP open 192.168.50.15:443 ttl 128 OS `Windows'
TCP open 192.168.50.20:3306 ttl 64 OS `Linux'
đź§ Analysis Table
IP | Ports | OS Guess |
---|---|---|
192.168.50.10 | 22, 80 | Linux |
192.168.50.15 | 443 | Windows |
192.168.50.20 | 3306 | Linux |
📊 Use:
wireshark scan_results.pcap
To verify TTL, TCP flags, and handshake behavior.
đź§ Pro Tips
- Use lower
-r
values on sensitive networks to avoid IDS detection. - Combine with
-mTsFPU
for Xmas-style stealthy probes. - Always log scans using
-w
for offline analysis. - Compare results with Nmap or Masscan for confirmation.
đź§° Final Cheat Sheet
Use Case | Command |
---|---|
Basic SYN Scan | unicornscan 10.0.0.5 |
UDP Service Detection | unicornscan -mU -r200 -I 10.0.0.5:53 |
Subnet Multi-Port Scan | unicornscan -r500 -mT 10.0.0.0/24:80,443 |
OS Detection + Logging | unicornscan -eosdetect -mT -w file.pcap target:ports |
đź§© Conclusion
Unicornscan is a powerful asset in your recon toolkit. While Nmap offers versatility, Unicornscan excels when speed, stealth, and TTL-based OS fingerprinting matter.
✍️ By Rajkumar Kumawat 🔗 GitHub Blog | Medium