Active Recon

Port Scanning

Set the ip address as a variable

export ip=192.168.17.141

Netcat port scanning

nc -nvv -w 1 -z $ip 3388-3390

Discover active IPs using ARP on the netword

arp-scan $ip/24

Discover who else is on the network

netdiscover

Discover IP MAC and MAC vendors from ARP

netdiscover -r $ip/24

Nmap

Find hosts alive

nmap -sP $ip/24

Stealth scan using SYN

nmap -sS $ip

Stealth scan using FIN

Banner Grabbing

OS Figerprinting

Regular Scan

Enumeration Scan

Output to a file

Enumeration Scan All Ports TCP / UDP and output to a txt file

Quick Scan

Quick Scan Plus

Quick Traceroute

Intense Scan

Instense Scan Plus UDP

Intense Scan ALL TCP Ports

Intense Scan - No Ping

Ping scan

Slow Comprehensive Scan

Scan with Active connect in order to weed out any spoofed ports designed to troll you

Run the default scripts and normal port scan against all the found ports

Run all nmap scan scripts against found ports

Port scan with file report

AMAP

Identify unknown services

HackTheBox

IppSec

Cyber Mentor

Last updated

Was this helpful?