Network Enumeration
Ping Sweep
# Ping Sweep For Loop on Linux
for i in {1..254} ;do (ping -c 1 172.16.5.$i | grep "bytes from" &) ;done
# Ping Sweep For Loop Using CMD
for /L %i in (1 1 254) do ping 172.16.5.%i -n 1 -w 100 | find "Reply"
# Ping Sweep Using PowerShell
1..254 | % {"172.16.5.$($_): $(Test-Connection -count 1 -comp 172.15.5.$($_) -quiet)"}
# Scan network range for open port 445
for i in $(seq 1 254); do nc -zv -w 1 172.16.5.$i 445; done
# Ping Sweep metasploit
run post/multi/gather/ping_sweep RHOSTS=172.16.5.0/23Scan Network Range
sudo nmap 10.10.0.0/24 -sn -oA tnet | grep for | cut -d" " -f5
sudo nmap -v -sn 10.10.2.1-253 -oG sweep.txt ; grep Up sweep.txt | cut -d " " -f 2Convert nmap XML report to HTML
xsltproc target.xml -o target.htmlACK-Scan
sudo nmap 10.10.0.1 -p 21 -sA -Pn -nScan by Using Decoys
sudo nmap 10.129.2.28 -p 80 -sS -Pn -n -D RND:5Scan by Using Different Source IP
SYN-Scan From DNS Port
Fast Scan
Service Scanning
Nmap Options
-n
Never do DNS resolution
-sS
TCP SYN scan
-sT
TCP connect scan
-sU
UDP scans
-sV
Version detection
--version-all
Try every single Version probe (intensity 9)
-O
Enable OS detection
--osscan-guess:
Guess OS more aggressively
-sC
Run default NSE script
Last updated