Nmap Enumeration

host enum

  • host discovery
  • host and port scanning
    • top 10 ports sudo nmap 10.129.2.28 --top-ports=10
    • trace the packets sudo nmap 10.129.2.28 -p 21 --packet-trace -Pn -n --disable-arp-ping
    • tcp connect sudo nmap 10.129.2.28 -p 443 --packet-trace --disable-arp-ping -Pn -n --reason -sT
    • open udp ports sudo nmap 10.129.2.28 -F -sU
  • saving the results
    • save results in all formats sudo nmap 10.129.2.28 -p- -oA target
    • convert xml to html xsltproc target.xml -o target.html
  • service enumeration
    • service scan with stats updates sudo nmap 10.129.2.28 -p- -sV --stats-every=5s
  • nmap scripting engine
    • using scripts nmap <target> --script <script-name>,<script-name> like --script vuln
  • performance

bypass security measures

  • firewall and ids/ips evasion
    • decoy scan to evade IPS blocking subnet -D RND:5
    • using a different address sudo nmap 10.129.2.28 -n -Pn -p 445 -O -S 10.129.2.200 -e tun0
    • dns proxy --dns-server <ns>,<ns>
    • scan from another source port -v -sV -p- -Pn -n --disable-arp-ping --source-port 53
    • connect from a different source port too nc -nv -p 53 10.129.99.171 50000

Written By

GitHub Contributor Team