Ugrás a fő tartalomra

NetRecon Scanner

NetRecon Scanner is a standalone Android network security auditing tool. It runs independently on your Android device without requiring a probe, making it ideal for field work, quick assessments, and on-the-go network reconnaissance.

Key Features

  • ARP Discovery — find all devices on the local network using ARP requests
  • Port Scanning — scan TCP ports to find open services on discovered hosts
  • Service Detection — identify running services and their versions via banner grabbing
  • Device Profiling — classify devices by combining OUI lookup, open ports, and service signatures
  • WiFi Heatmap — visualize wireless signal strength across physical locations
  • PDF Reports — generate professional security audit reports
  • SSH Terminal — connect to devices directly from the app
  • CVE Intelligence — offline CVE database for vulnerability lookup
  • Attack Surface Map — visual representation of the network's exposure
  • Passive Monitor — continuous background monitoring for new devices
  • 11 Languages — full localization support

Operating Modes

NetRecon Scanner supports three operating modes, depending on your device's capabilities:

Standard Mode

Works on any Android device without special permissions. Uses standard Android networking APIs for discovery and scanning.

Shizuku Mode

Leverages the Shizuku service for elevated network access without root. Enables faster ARP scanning and raw socket access.

Root Mode

Full access to all network capabilities. Enables the fastest scanning speed, promiscuous mode capture, and advanced features like ARP spoofing detection.

FeatureStandardShizukuRoot
ARP discoverySlowFastFastest
Port scanningYesYesYes
Raw socketsNoYesYes
PCAP captureNoLimitedFull
Passive monitoringLimitedYesYes

Scan Types

ARP Discovery

Sends ARP requests to every IP in the target subnet to identify live hosts. This is the fastest and most reliable method for discovering devices on a local network.

TCP Port Scan

Connects to specified TCP ports on each discovered host. Supports configurable port ranges and concurrent connection limits.

Service Detection

After finding open ports, the scanner sends protocol-specific probes to identify the running service. Recognizes hundreds of common services including HTTP, SSH, FTP, SMB, RDP, databases, and more.

Device Profiling

Combines multiple data sources to identify what a device is:

  • MAC address OUI (manufacturer) lookup
  • Open port fingerprint matching
  • Service banner analysis
  • mDNS/SSDP service announcements

Probe Integration

While the Scanner works independently, it can also connect to a NetRecon Probe for enhanced capabilities:

  • View probe scan results alongside local scans
  • Trigger remote scans from the app
  • Access IDS alerts and vulnerability data from the probe
  • Combine local and probe data in reports

To connect to a probe, go to Settings > Probe Connection and enter the probe's IP address or scan the QR code from the probe dashboard.

Performance

The scanner is optimized for mobile devices:

  • Maximum 40 concurrent socket connections (adaptive based on battery level)
  • CPU-intensive profiling runs in a dedicated isolate to keep the UI responsive
  • OUI database is lazy-loaded with an LRU cache (500 entries)
  • Battery-aware scanning reduces concurrency when battery is low

FAQ

Q: Does the Scanner require internet access? A: No. All scanning features work offline. Internet is only needed for the initial CVE database download and updates.

Q: Can I scan networks I am not connected to? A: The Scanner can only discover devices on the network your Android device is currently connected to via Wi-Fi. To scan remote networks, use a probe.

Q: How accurate is device profiling? A: Device profiling correctly identifies the device type in approximately 85-90% of cases. Accuracy improves when more ports and services are detected (use the Standard or Deep scan profile).

For additional help, contact support@netreconapp.com.