diff --git a/webui/index.php b/webui/index.php index d851d8e..37807fc 100644 --- a/webui/index.php +++ b/webui/index.php @@ -126,6 +126,190 @@ + + +
+ Choose the right scan mode based on what you're trying to discover. Each mode is designed for different situations. +
+ + +NormalWebScanStealthFlyoverNuke+ Best for: General-purpose scanning when you don't know what to expect +
++ Performs port scanning, service detection, basic web checks, and vulnerability scanning. Good balance of speed and coverage. +
++ Best for: When you need to avoid detection or minimize network noise +
++ Uses slower, quieter techniques. Avoids aggressive scanning that could trigger alerts. Takes longer but less likely to be noticed. +
++ Best for: Targets you know are websites (ports 80 and 443 only) +
++ Focuses only on web services. Fast because it skips non-web ports. Captures screenshots, checks technologies, and finds common web issues. +
++ Best for: Deep web application security testing +
++ Thorough web app analysis including directory brute-forcing, vulnerability scanning with Nikto/Nuclei, CMS detection, and more. Takes longer but finds more issues. +
++ Best for: Services running on non-standard ports (e.g., web server on port 8080) +
++ Enter the specific port number when using these modes. Use WebPortHTTP for HTTP services or WebPortHTTPS for HTTPS services on custom ports. +
++ Best for: Finding services hidden on unusual ports +
++ Scans all 65,535 ports. Very thorough but takes significantly longer. Use when you suspect services are running on non-standard ports. +
++ Best for: Quick reconnaissance of many targets +
++ Fast overview of multiple targets. Perfect for initial scoping to identify which targets need deeper investigation. +
++ Best for: Fast enumeration across many targets +
++ More thorough than Flyover but still optimized for speed. Good for medium-depth scanning of a target list. +
++ Best for: Complete security audit of multiple targets +
++ ⚠️ Aggressive mode. Runs everything - all scans, all checks, maximum coverage. Very thorough but time-consuming and noisy. +
++ Best for: Running specific scan types across many targets +
++ Specialized bulk scanning. MassWeb for web detection, MassWebScan for deep web analysis, MassVulnScan for vulnerability scanning, MassPortScan for port discovery. +
++ Best for: Network/CIDR range scanning (e.g., 192.168.1.0/24) +
++ Use to find live hosts on a network. Enter a network range instead of a single target to discover all active devices. +
++ Searches public sources (Shodan, Censys, etc.) for information about your target. Finds exposed services, historical data, and leaked information. +
++ Discovers subdomains and DNS information. Essential for finding all assets associated with a domain (e.g., mail.example.com, dev.example.com). +
++ Attempts to find hidden directories and login pages. Also tries common password attacks on discovered services. ⚠️ Can be noisy. +
++ Scans all 65,535 ports instead of just common ones. Takes much longer but finds services running on unusual ports. +
+