software:nmap
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revisionNext revisionBoth sides next revision | ||
software:nmap [2014/11/10 01:32] – created superwizard | software:nmap [2020/09/29 03:34] – [Broadcast Scripts] superwizard | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | ====== regular scan ====== | ||
+ | |||
+ | <WRAP center round box > | ||
+ | |||
+ | 2020-08-28 | ||
+ | |||
+ | nmap 10.9.8.1 | ||
+ | |||
+ | </ | ||
+ | |||
+ | |||
+ | |||
+ | ====== output the scan to file with all of those formats ====== | ||
+ | |||
+ | <WRAP center round box > | ||
+ | |||
+ | 2020-07-21 | ||
+ | |||
+ | nmap -oA c: | ||
+ | |||
+ | Result stored in three files of type grep xml and text | ||
+ | nmap -oA c: | ||
+ | |||
+ | Now, what if you want to output the scan to all of those formats? XML, text, and grepable? Simple! Use: | ||
+ | nmap -oA test 10.73.31.1. | ||
+ | |||
+ | Now if I use ls -l test.* I’ll see all of the newly created files. gnmap is Grep, XML is XML, and .nmap is a text file. | ||
+ | |||
+ | From < | ||
+ | </ | ||
+ | |||
+ | |||
+ | |||
+ | |||
+ | ====== Broadcast Scripts ====== | ||
+ | |||
+ | From: https:// | ||
+ | |||
+ | <WRAP center round box > | ||
+ | Attempts to discover available IPv6 hosts on the LAN by sending an MLD (multicast listener discovery) query to he link-local multicast address (ff02::1) and listening for any responses. The query' | ||
+ | |||
+ | </ | ||
+ | |||
+ | |||
+ | <WRAP center round box > | ||
+ | " | ||
+ | Sends an ICMPv6 echo request packet to the all-nodes link-local | ||
+ | multicast address (< | ||
+ | on a LAN without needing to individually ping each IPv6 address. | ||
+ | ]]" | ||
+ | |||
+ | --- | ||
+ | -- @usage | ||
+ | -- ./nmap -6 --script=targets-ipv6-multicast-echo.nse --script-args ' | ||
+ | -- @output | ||
+ | |||
+ | |||
+ | From: https:// | ||
+ | </ | ||
+ | |||
+ | ====== Ubiquiti Scan ====== | ||
+ | |||
+ | |||
+ | nmap -sU -p 10001 --script ubiquiti-discovery.nse < | ||
+ | |||
+ | From < | ||
+ | |||
+ | |||
+ | ====== broadcast-dns-service-discovery ====== | ||
+ | |||
+ | |||
+ | From: https:// | ||
+ | |||
+ | nmap --script broadcast-dns-service-discovery | ||
+ | |||
+ | ====== File broadcast-dhcp-discover ====== | ||
+ | |||
+ | From: https:// | ||
+ | |||
+ | < | ||
+ | sudo nmap --script broadcast-dhcp-discover | ||
+ | |||
+ | File broadcast-dhcp6-discover | ||
+ | |||
+ | sudo nmap -6 --script broadcast-dhcp6-discover | ||
+ | </ | ||
+ | |||
+ | ====== nmap cheat sheet ====== | ||
+ | |||
+ | From: https:// | ||
+ | |||
+ | < | ||
+ | Basic Scanning Techniques | ||
+ | |||
+ | Scan a single target —> nmap [target] | ||
+ | |||
+ | Scan multiple targets —> nmap [target1, | ||
+ | |||
+ | Scan a list of targets —-> nmap -iL [list.txt] | ||
+ | |||
+ | Scan a range of hosts —-> nmap [range of IP addresses] | ||
+ | |||
+ | Scan an entire subnet —-> nmap [IP address/ | ||
+ | |||
+ | Scan random hosts —-> nmap -iR [number] | ||
+ | |||
+ | Excluding targets from a scan —> nmap [targets] –exclude [targets] | ||
+ | |||
+ | Excluding targets using a list —> nmap [targets] –excludefile [list.txt] | ||
+ | |||
+ | Perform an aggressive scan —> nmap -A [target] | ||
+ | |||
+ | Scan an IPv6 target —> nmap -6 [target] | ||
+ | </ | ||
+ | |||
====== nmap ====== | ====== nmap ====== | ||
software/nmap.txt · Last modified: 2022/07/13 19:48 by superwizard