Scanning
Nmap Scans
nmap -T4 -p- -A <IP>
# T0 -> slowest but covert, T4 -> aggressive but noisy.nmap -sU --top-ports 100 -vvv <IP>
# UDP Portsnmap --top-ports 100 -F
# Top 100 Portsnmap -p1-1023 <IP>
# Port Rangenmap -p22,80,443 <IP>
# Specific Portsnmap <IP>/24
# Subnetnmap -sT -p- --min-rate 5000 --max-retries 1 <IP>
# TCP Portsnmap -sU -p- --min-rate 5000 --max-retries 1 <IP>
# UDP Ports
RustScan & Autorecon
RustScan:
docker run -it --rm --name rustscan rustscan/rustscan:2.0.0 -a <IP> range 0-65535 -- -A
Autorecon:
autorecon <IP>
Directory Busting
dirb http:///<IP>/
# If port -> 443, Do HTTPSgobuster dir -x php,txt,xml,asp,aspx --url http://<IP>/ -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-big.txt -b 404 -f
feroxbuster --url http://<IP>/ --filter-status 401,402,403,404 -x txt,cgi,sh,pl,asp,aspx,php --depth 2 --output ferox.result -k --wordlist=/usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -f
ffuf -c -u http://<IP>/FUZZ -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt
Vulnerability Scanner - Nikto
nikto -host http://<IP>/
# If port -> 443, Do HTTPS
Last updated
Was this helpful?