Active Recon
Port Scanning
Set the ip address as a variable
export ip=192.168.17.141Netcat port scanning
nc -nvv -w 1 -z $ip 3388-3390Discover active IPs using ARP on the netword
arp-scan $ip/24Discover who else is on the network
netdiscoverDiscover IP MAC and MAC vendors from ARP
netdiscover -r $ip/24Nmap
Find hosts alive
nmap -sP $ip/24Stealth scan using SYN
nmap -sS $ipStealth scan using FIN
Banner Grabbing
OS Figerprinting
Regular Scan
Enumeration Scan
Output to a file
Enumeration Scan All Ports TCP / UDP and output to a txt file
Quick Scan
Quick Scan Plus
Quick Traceroute
Intense Scan
Instense Scan Plus UDP
Intense Scan ALL TCP Ports
Intense Scan - No Ping
Ping scan
Slow Comprehensive Scan
Scan with Active connect in order to weed out any spoofed ports designed to troll you
Run the default scripts and normal port scan against all the found ports
Run all nmap scan scripts against found ports
Port scan with file report
AMAP
Identify unknown services
HackTheBox
IppSec
Cyber Mentor
Last updated
Was this helpful?