Scanning
Last updated
Was this helpful?
Last updated
Was this helpful?
Nmap Scans
nmap -T4 -p- -A <IP>
# T0 -> slowest but covert, T4 -> aggressive but noisy.
nmap -sU --top-ports 100 -vvv <IP>
# UDP Ports
nmap --top-ports 100 -F
# Top 100 Ports
nmap -p1-1023 <IP>
# Port Range
nmap -p22,80,443 <IP>
# Specific Ports
nmap <IP>/24
# Subnet
nmap -sT -p- --min-rate 5000 --max-retries 1 <IP>
# TCP Ports
nmap -sU -p- --min-rate 5000 --max-retries 1 <IP>
# UDP Ports
RustScan & Autorecon
: docker run -it --rm --name rustscan rustscan/rustscan:2.0.0 -a <IP> range 0-65535 -- -A
: autorecon <IP>
Directory Busting
dirb http:///<IP>/
# If port -> 443, Do HTTPS
gobuster dir -x php,txt,xml,asp,aspx --url http://<IP>/ -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-big.txt -b 404 -f
feroxbuster --url http://<IP>/ --filter-status 401,402,403,404 -x txt,cgi,sh,pl,asp,aspx,php --depth 2 --output ferox.result -k --wordlist=/usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -f
ffuf -c -u http://<IP>/FUZZ -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt
Vulnerability Scanner - Nikto
nikto -host http://<IP>/
# If port -> 443, Do HTTPS