Documentation Index
Fetch the complete documentation index at: https://mintlify.com/GhostTroops/scan4all/llms.txt
Use this file to discover all available pages before exploring further.
Overview
scan4all includes intelligent honeypot detection to avoid wasting time on deception systems and prevent potential blacklisting. The detection system analyzes HTTP server headers and response patterns to identify likely honeypots.Enable Honeypot Detection
Environment Variable
Configuration File
Inconfig/config.json:
Detection Methods
Server Header Analysis
The primary detection method analyzes HTTPServer headers for anomalies:
Detection Criteria
A target is flagged as a honeypot if:
- Server header exceeds 50 characters
- Server header contains more than 3 comma-separated components
- Unusual server identification patterns
Why These Indicators?
Honeypots often exhibit unusual characteristics:- Long Server Strings: Attempting to mimic multiple services
- Multiple Components: Fake banner stacking
- Inconsistent Responses: Conflicting service information
Detection Workflow
Implementation Details
Memory Caching
Results are cached to avoid repeated checks:HTTP HEAD Request
Minimal network footprint using HEAD requests:Target Filtering
Certain targets are automatically excluded:- Very short hostnames (likely invalid)
- CIDR ranges (checked during host enumeration)
- When detection is disabled
Integration Points
Port Scanner Integration
Fingerprint Scanner Integration
If more than 10 different fingerprints are detected on a single target, it’s flagged as suspicious and results are discarded.
Behavior
When Honeypot Detected
- Log Entry: “Honeypot found, skipped for you: [target]”
- Skip Scanning: Target removed from queue
- Cache Result: Avoid re-checking same target
- Continue: Move to next target
What Gets Skipped
- Port scanning
- Service detection
- Vulnerability scanning
- Fingerprinting
- Exploitation attempts
Performance Impact
Network Overhead
Time Impact
Minimal delay:- Cached lookups: less than 1ms
- HEAD request: ~100-500ms average
- Timeout: 8 seconds maximum
Advanced Configuration
Customize Detection Logic
Editlib/util/HoneypotDetection.go:
Custom Fingerprint Threshold
Logging
Honeypot detections are logged:- Target URL
- Detection source (scan4all)
- Detection message
- Timestamp
False Positives
Common Causes
- Load Balancers: May aggregate multiple server headers
- WAF/Proxy: Security appliances add headers
- Misconfigured Servers: Poor administration
Handling False Positives
False Negatives
Sophisticated Honeypots
Some honeypots may evade detection:- Perfectly mimicked server headers
- Realistic response patterns
- Professional implementation
Best Practices
- Enable for Unknown Networks: Always enable when scanning unfamiliar targets
- Monitor Logs: Review detected honeypots for patterns
- Adjust Thresholds: Tune based on your environment
- Combine with Other Intel: Use alongside passive reconnaissance
- Regular Updates: Keep detection logic current with honeypot trends
Use Cases
Bug Bounty Hunting
Red Team Operations
Mass Scanning
Penetration Testing
Troubleshooting
Detection Not Working
Too Many Detections
Cache Issues
Comparison with Other Tools
| Feature | scan4all | Other Scanners |
|---|---|---|
| Auto Detection | Yes (optional) | Usually No |
| Server Analysis | Yes | Limited |
| Fingerprint Count | Yes | No |
| Caching | Yes | Varies |
| Configurable | Yes | Limited |
See Also
- Configuration - Detection configuration options
- Fingerprinting - Related fingerprint analysis
- Best Practices - Safe scanning techniques