Nmap

💡 | awk '{print $1}' | awk -F'/' '{print $1}' | paste -sd "," - use this to grep all the ports from nmap output.

Nmap full port scan

nmap 10.10.10.10 -p- -T4 -vv

Script Scan on Discovered Ports

nmap 10.10.10.10 -sC -sV -A -p80,22,21

Nmap Scan - (LDAP)

nmap -n -sV -script "ldap* and not brute" 10.10.10.10

Scan Network Range

sudo nmap 10.129.2.0/24 -sn -oA tnet | grep for | cut -d" " -f5

scan on a predefined list.

sudo nmap -sn -oA tnet -iL hosts.lst | grep for | cut -d" " -f5

Scan multiple IPs

sudo nmap -sn -oA tnet 10.129.2.18 10.129.2.19 10.129.2.20| grep for | cut -d" " -f5

If the IPs are next to each other we can define the range.

sudo nmap -sn -oA tnet 10.129.2.18-20| grep for | cut -d" " -f5

Scan Single IP

sudo nmap 10.129.2.18 -sn -oA host

Packet Trace

sudo nmap 10.129.2.18 -sn -oA host -PE --packet-trace

Reason

sudo nmap 10.129.2.18 -sn -oA host -PE --reason

Styling Sheets

xsltproc target.xml -o target.html

Read More here.


FPING

fping -asgq 172.16.5.0/23

Last updated