{"version":1,"type":"rich","provider_name":"Libsyn","provider_url":"https:\/\/www.libsyn.com","height":300,"width":600,"title":"Scanning The Internet with Linux Tools - PSW #919","description":"In this segment, we will explore some pretty awesome tools for scanning the Internet, with a focus on network edge devices. We'll bring it all together with Claude Code and look at some sample results. Tools include:  Shodan | Passive recon \u2014 query existing scan data for exposed devices, services, and vulns | Passive (API) | Instant (no packets sent) ZMap | Host discovery \u2014 find live hosts with open ports | L4 (TCP SYN, UDP, ICMP) | Millions of packets\/sec ZGrab2 | Application-layer handshakes \u2014 grab banners, certs, headers | L7 (30+ protocol modules) | Thousands of hosts\/sec Nerva | Service fingerprinting \u2014 identify 140+ protocols with metadata, CPEs, technology stacks | L7 (TCP, UDP, SCTP) | Fast, concurrent Nuclei | Template-based vulnerability scanning \u2014 default creds, exposed panels, known CVEs | L7 (HTTP, network) | Hundreds of targets\/min Shannon | Vulnerability exploitation \u2014 AI-powered whitebox pentesting of web apps | Application | ~1-1.5 hrs per target edgescan.py | Automated pipeline \u2014 orchestrates all tools above into a single command | Orchestration | End-to-end  Show Notes: https:\/\/securityweekly.com\/psw-919 ","author_name":"Paul's Security Weekly (Video)","author_url":"https:\/\/securityweekly.com\/psw","html":"<iframe title=\"Libsyn Player\" style=\"border: none\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/40503095\/height\/300\/theme\/custom\/thumbnail\/yes\/direction\/forward\/render-playlist\/no\/custom-color\/88AA3C\/\" height=\"300\" width=\"600\" scrolling=\"no\"  allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen><\/iframe>","thumbnail_url":"https:\/\/assets.libsyn.com\/secure\/content\/199747590"}