Nmap Scanning
AutoRecon
Initial scan TCP
Full scan TCP
Comprehensive nmap scans in the background to make sure we cover all bases.
Full scan UDP
Sparta
SPARTA is a python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase.
Normal Scan
Scan for alive hosts
If you want a little faster,
Scan specific IP range
Sort out the machines that are up
and now filter all the IPs and create a file.
Scan a host
Scan specific machine
Scan common port
The command:
Scan 1024 most common ports
Run OS detection
Run default nmap scripts
Save the result into
.nmap
,.gnmap
and.xml
Faster
Fast scanning
Scan 100 most common ports
Quick TCP Scan
Quick UDP Scan
Full TCP Scan
Port knock
Scan deeply
Scanning more deeply:
This command:
Scan all 65535 ports with full connect scan
Take very long time
Print out straigt away instead of having to wait until end of the scan
Tips:
Scanning this takes a long time, suggest to leave the scan running overnight, when you're sleep or move on to different box in the meantime.
Scan for specific port
Use -T
: specifies TCP ports. Use -U
: for UDP ports.
Scan for unused IP addresses and store in text file
Other option
UDP scan
Scanning this might slow and unreliadble
Scan targets from a text file
Create a text file contains of our targets machine (like in method Scan for unused IP addresses and store in text file):
Run this nmap command with -iL
Onetwopunch.sh
Grab the latest bash script
Create a text file contains of our targets machine (like in method Scan for unused IP addresses and store in text file):
Then, run the script and tell it to read our txt file and perform TCP scan against each target.
So, the idea behind the script to generate a scan of 65,535 ports on the targets. The script use unicornscan to scan all ports, and make a list of those ports that are open. The script then take the open ports and pass them to nmap for service detection.
AutoRecon
Last updated