Angry IP Scanner is a utility that allows a hacker or network administrator to scan a given network to gather information about active hosts, the ports they accept connections on, and a wealth of other information. It is very similar to programs such as NMAP, and it is a tool frequently utilized by both black hat and white hat hackers.
Step 1: Install the Software
The first step is actually downloading and setting up your linux platform and then installing the software, which is available on a variety of platforms. For the purposes of this demonstration, we will assume that you want to install it on Ubuntu. There is an incredibly important package dependency (e.g. prerequisite software) called OpenJDK. Run the following commands to install the software:
· sudo apt-get install openjdk-7-jdk
· sudo dpkg -i ipscan_3.2.1_*.deb
Please note that these commands need to be run inside the
terminal, otherwise known as the BASH shell. It is also advisable to be logged in as the root user, though the sudo command will give you the necessary privileges.
Step 2: Launch the Application (GUI)
The logical next step, of course, is to actually fire up the program once it has been installed. You can select it either from the Dash or Menu. After you click on it, it will ask you for some basic information and present you with the Getting Started page. Either click the Next button to navigate through the menu or simply click the Close button to circumvent the Getting Started mode. Also note that the default IP address used in the scans is your current adapter’s IP address, which can be changed before you initiate your first scan.
Step 3: Perform a Basic Subnet Scan
If you want to see how many active hosts there are on your local network and which IP addresses they are using, simply run a basic subnet scan. To do so, simply change the last digit in the first IP address field to a “1” and the last digit in the second IP address field to “255.” After the scan is complete, the software will return a list of all active hosts on the network.
Step 4: Scan the Local Network for a Single Port
If you want to see if any hosts on your local network are accepting connections on a specific port, simply click the settings button immediately to the right of the IP Range fields. In the settings window that pops up, click on the Ports tab, and look for the field at the very bottom. Enter in a single port, such as 80 to search for web servers on your local subnet.
Step 5: Scan the Local Network for a Range of Ports
If you wish, you can scan for a range of ports using the same settings menu. Be warned: these scans can take much longer. However, you do have the option of scanning for open ports in a wide range such as 1-1000.
Step 6: Export Scan Results
To export and save the results of your scan, simply click Scan -> Export All. This is incredibly useful when you need to analyze large amounts of data in a spreadsheet or other type of file.
Step 7: Access Ancillary Tools
There are several tools that allow you to interact with hosts that were discovered as a result of the scan (ping, traceroute, telnet, etc.). To access these extra tools, simply select Commands -> Open -> Select.