If you don't have NMAP yet in your server, use this link to get it installed in your server. The following Nmap commands always come handy, so check them out:
Scan For Unused IP Address
# nmap -T4 -sP 192.168.0.0/24 && egrep "00:00:00:00:00:00" /proc/net/arp
Get Info About Remote Host Ports And OS Detection
# nmap -sS -P0 -sV -O targetIP
Get List of Servers With A Specific Port Open
# nmap -sT -p 80 -oG - 192.168.0.* | grep open
Change the -p argument for the port number.
Scan Network for Rogue APs
# nmap -A -p1-85,113,443,8080-8100 -T4 --min-hostgroup 50 --max-rtt-timeout 2000 --initial-rtt-timeout 300 --max-retries 3 --host-timeout 20m --max-scan-delay 1000 -oA wapscan 10.0.0.0/8
Find All Active IP Addresses In A Network
# nmap -sP 192.168.0.*
Use A Decoy IP While Scanning Ports
# sudo nmap -sS targetIP -D fakeIP
How Many Linux And Windows Devices Are On Your Network?
# sudo nmap -F -O 192.168.0.1-255 | grep "Running: " > /tmp/os; echo "$(cat /tmp/os | grep Linux | wc -l) Linux device(s)"; echo "$(cat /tmp/os | grep Windows | wc -l) Window(s) devices"
UDP Scanning
# sudo nmap -sU -P0 -T Aggressive -F targetIP
No comments:
Post a Comment
Hi, Leave a comment here and one of the binary piper's will reply soon :)