Port Scanning

Nmap

Ping scan

nmap -sn 10.0.0.1/24

Nmap stealth scan using SYN

nmap -sS 10.0.0.1

Nmap stealth scan using FIN

nmap -sF 10.0.0.1

Nmap Banner Grabbing

nmap -sV -sT 10.0.0.1

Nmap OS Fingerprinting

nmap -O 10.0.0.1

Nmap Regular Scan:

nmap 10.0.0.1/24

Enumeration Scan

nmap -p 1-65535 -sV -sS -A -T4 10.0.0.1/24 -oN nmap.txt

Enumeration Scan All Ports TCP / UDP and output to a txt file

nmap -oN nmap2.txt -v -sU -sS -p- -A -T4 10.0.0.1

Nmap output to a file:

nmap -oN nmap.txt -p 1-65535 -sV -sS -A -T4 10.0.0.1/24

Quick Scan:

nmap -T4 -F 10.0.0.1/24

Quick Scan Plus:

nmap -sV -T4 -O -F --version-light 10.0.0.1/24

Quick traceroute

nmap -sn --traceroute 10.0.0.1

All TCP and UDP Ports

nmap -v -sU -sS -p- -A -T4 10.0.0.1

Intense Scan:

nmap -T4 -A -v 10.0.0.1

Intense Scan Plus UDP

nmap -sS -sU -T4 -A -v 10.0.0.1/24

Intense Scan ALL TCP Ports

nmap -p 1-65535 -T4 -A -v 10.0.0.1/24

Intense Scan - No Ping

nmap -T4 -A -v -Pn 10.0.0.1/24

Scan with Active connect in order to weed out any spoofed ports designed to troll you

nmap -p1-65535 -A -T5 -sT 10.0.0.1

Netcat

results matching ""

    No results matching ""