CHScanner is an ARP, IPv4 and IPv6 network scanner with 31 scan methods: it scans for open ports, protocols, NetBIOS informations and Windows shares, SNMP information, and WMI (WBEM) information. It also have the ability to turn on (using Wake-On-LAN) and to shutdown or reboot a remote Windows host. Features an automatic (scriptable) working mode, a hunt mode, a passive mode and the normal scanning mode.

The main differences between CHScanner and other similar tools are:
CHScanner use an Operating System Mimic Technology;
CHScanner has a lot more scanning methods compared with many other scanners, starting from the Layer 2 of the OSI model. It does not only scans IPv4 addresses, it also uses ARP, IGMP, IPv6 and some higher level protocols like NetBIOS, SNMP and WMI;
It is very flexible, scanning being done based on user defined configuration files, and quite fast;
Besides the skinnable graphical interface, CHScanner can be used from command line to automate the scans.

CHScanner needs WinPcap version 4.0.2 or higher.

Download and more info: http://code.google.com/p/chscanner

Explore More

Rooting webhost

r00ting a webhost Introduction: Well taking over a host isnt as easy as you may think. There is a fairly big process involved and a lot of fidiling around. Below

Mozilla Firefox the most vulnerable browser?

Its hard time for guys at Mozilla firefox. The browser has earned the title of being the most vulnerable application on windows platform. Application white listing and application control vendor

What are the various steps in the pre-attack phase?

In the pre-attack phase, there are seven steps, which have been defined by the EC-Council, as follows: 1. Information gathering 2. Determining network range 3. Identifying active machines 4. Finding