Active Recon
Port Scanning
Set the ip address as a variable
export ip=192.168.17.141Netcat port scanning
nc -nvv -w 1 -z $ip 3388-3390Discover active IPs using ARP on the netword
arp-scan $ip/24Discover who else is on the network
netdiscoverDiscover IP MAC and MAC vendors from ARP
netdiscover -r $ip/24Nmap
Find hosts alive
nmap -sP $ip/24Stealth scan using SYN
nmap -sS $ipStealth scan using FIN
nmap -sF $ipBanner Grabbing
nmap -sV -sT $ipOS Figerprinting
nmap -O $ipRegular Scan
nmap $ip/24Enumeration Scan
nmap -p 1-65535 -sV -sS -A -T4 $ip/24Output to a file
nmap -oN nmapEnumeration Scan All Ports TCP / UDP and output to a txt file
nmap -oN nmap.txt -v -sU -sS -p- -A -T4 $ipQuick Scan
nmap -T4 -F $ip/24Quick Scan Plus
nmap -sV -T4 -O -F --version-light $ip/24Quick Traceroute
nmap -sn --traceroute $ipIntense Scan
nmap -T4 -A -v $ipInstense Scan Plus UDP
nmap -sS -sU -t4 -A -v $ip/24Intense Scan ALL TCP Ports
nmap -p 1-65535 -T4 -A -v $ip/24Intense Scan - No Ping
nmap -T4 -A -v -Pn $ip/24Ping scan
nmap -sn $ip/24Slow Comprehensive Scan
nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 --script "default or (discovery and safe)" $ip/24Scan with Active connect in order to weed out any spoofed ports designed to troll you
nmap -p1-65535 -A -T5 -sT $ipRun the default scripts and normal port scan against all the found ports
nmap -sC $ipRun all nmap scan scripts against found ports
nmap -Pn -sV -O -pT:{TCP ports found},U:{UDP ports found} --script *vuln* $ipPort scan with file report
nmap -Pn -sS --stats-every 3m --max-retries 1 --max-scan-delay 20 --defeat-rst-ratelimit -T4 -p1-65535 -oA /root/nmap $ipAMAP
Identify unknown services
amap -d $ip <port>HackTheBox
IppSec
nmap -sC -sV -oA <filename> $ipCyber Mentor
nmap -T4 -A -p- $ipLast updated
Was this helpful?