Security Weekly Podcast Network (Audio) Scanning The Internet with Linux Tools - PSW #919
Mar 26, 2026
They walk through high-speed internet scanning tools and how to chain them into an automated pipeline. Topics include passive recon with Shodan, mass host discovery with ZMap, and application-layer grabs with ZGrab2. They cover service fingerprinting, template-based vulnerability checks, AI-assisted whitebox testing, and orchestrating everything with a Python EdgeScan workflow.
AI Snips
Chapters
Transcript
Episode notes
Nerva Advances High Speed Service Fingerprinting
- Service fingerprinting at scale can use newer tools like Nerva that support ~140 protocols and often outperform older options like ZGrab2.
- Paul found Nerva faster and more accurate for identifying vendors and CPEs across many hosts.
Shannon Merges Static And Dynamic AI Testing
- AI whitebox tools like Shannon combine source-code analysis and dynamic testing by cloning a repo and probing a live instance.
- Paul notes Shannon builds the repo, reasons about likely vulnerabilities, and then validates them against the running target.
Automate A Tool Chain For Continuous Edge Scanning
- Do automate chaining tools: discover hosts, fingerprint services, then scan vulnerabilities to create an end-to-end pipeline.
- Paul used Claude Code to write edge_scan.py that passes JSON between Shodan/ZMap, Nerva/ZGrab, and Nuclei.
