Skip to content

Network-wide Scanning

This function is similar to AutoSploit. Currently, only modules for testing purposes are available.

Network-wide Search/Vulnerability Scanning

  • Before performing the network-wide search function, you need to configure the API keys of Internet mapping services such as Quake, FOFA, and Hunter.

  • Click New Task to open the new task interface.

  • After selecting a module, you can use the search function to find hosts on the current Internet that are compatible with the module.

  • Each module has built-in fingerprint rules. For example, the adaptation rule for the SSH brute-force cracking module is "protocol=SSH", which can be viewed in the Description section.

  • The rules entered by the user, such as ip="47.240.60.0/24", will be combined with the existing rules of the module into ip="47.240.60.0/24" && "protocol=SSH" and sent to the backend. The backend will call APIs such as Quake, FOFA, and Hunter for querying and return the results.

  • After creating a new task, a waiting list will be automatically established. Viper will automatically retrieve tasks from the list for execution.

Viper automatically controls the background to execute a maximum of 3 tasks simultaneously, so you don't have to worry about excessive traffic.