software:nmap
This is an old revision of the document!
Table of Contents
broadcast-dns-service-discovery
From: https://nmap.org/nsedoc/scripts/broadcast-dns-service-discovery.html
nmap --script broadcast-dns-service-discovery
File broadcast-dhcp-discover
From: https://nmap.org/nsedoc/scripts/broadcast-dhcp-discover.html
sudo nmap --script broadcast-dhcp-discover File broadcast-dhcp6-discover sudo nmap -6 --script broadcast-dhcp6-discover
nmap cheat sheet
From: https://pentestlab.blog/2012/08/17/nmap-cheat-sheet/
Basic Scanning Techniques Scan a single target —> nmap [target] Scan multiple targets —> nmap [target1,target2,etc] Scan a list of targets —-> nmap -iL [list.txt] Scan a range of hosts —-> nmap [range of IP addresses] Scan an entire subnet —-> nmap [IP address/cdir] Scan random hosts —-> nmap -iR [number] Excluding targets from a scan —> nmap [targets] –exclude [targets] Excluding targets using a list —> nmap [targets] –excludefile [list.txt] Perform an aggressive scan —> nmap -A [target] Scan an IPv6 target —> nmap -6 [target]
nmap
From: http://krypted.com/tag/smb/
Basic Scanning To then scan a computer, just use the mmap command followed by the host name or even throw a -v option in there to see more information (you can use a hostname or an IP): nmap -v www.apple.com Use the -6 option if scanning via IPv6: nmap -v -6 8a33:1a2c::83::1a Firewalls Next, we’ll look at trying to bypass pesky annoyances like stageful packet inspection on firewalls. First, check whether there is actually a firewall using -s: nmap -sA www.apple.com Scan even if the host is protected by a firewall: nmap -PN www.apple.com Just check to see if some devices are up even if behind a firewall: nmap -sP 192.168.210.10-20
software/nmap.1577483222.txt.gz · Last modified: 2019/12/27 21:47 by superwizard