9 Haziran 2011 Perşembe

12/28 - Nmap 5 cheat sheet and howto

Basic Scanning Techniques
Discovery Options
Advanced Scanning Functions
Port Scanning Options
Version Detection
Timing Options
Firewall Evasion Techniques
Output Options
Troubleshooting and Debugging
Nmap Scripting Engine
Ndiff nmap [targets] --exclude [targets] nmap 192.168.1.1/24 --exclude 192.168.1.0, 192.168.1.255 Excluding Targets Using a List nmap [targets] --excludefile [list.txt] nmap 192.168.1.1/24 --excludefile notargets.txt nmap -6 3ffe:6a88:85a3:08d3:1319:8a2e:0370:7344
Disable Reverse DNS Resolution Manually Specify DNS Server(s) nmap --dns-servers [servers] [target] nmap --dns-servers 194.109.9.99 192.168.1.1
nmap --scanflags [flags] [target] nmap --scanflags SYNFIN 192.168.1.1
nmap -p 21-25,80,139,8080 192.168.1.1 nmap -p [port name(s)] [target] nmap -sU -sT -p U:[ports],T:[ports] [target] nmap -sU -sT -p U:53,111,137,T:21-25,80,139,8080 192.168.1.1 nmap --top-ports [number] [target] nmap --top-ports 10 192.168.1.1 Perform a Sequential Port Scan
Attempt to Guess an Unknown OS nmap -O --osscan-guess [target] nmap -O --osscan-guess 192.168.1.1 nmap -sV --version-trace [target] nmap -sV --version-trace 192.168.1.1
Minimum # of Parallel Operations nmap --min-parallelism [number] [target] nmap --min-parallelism 10 192.168.1.1 Maximum # of Parallel Operations nmap --max-parallelism [number] [target] nmap --max-parallelism 1 192.168.1.1 nmap --min-hostgroup [number] [targets] nmap --min-hostgroup 50 192.168.1.1 nmap --max-hostgroup [number] [targets] nmap --max-hostgroup 1 192.168.1.1 nmap --initial-rtt-timeout [time] [target] nmap --initial-rtt-timeout 100ms 192.168.1.1 nmap --max-rtt-timeout [TTL] [target] nmap --max-rtt-timeout 100ms 192.168.1.1 nmap --max-retries [number] [target] nmap --max-retries 10 192.168.1.1 nmap --host-timeout [time] [target] nmap --host-timeout 30m 192.168.1.1 nmap --scan-delay [time] [target] nmap --scan-delay 1s 192.168.1.1 nmap --max-scan-delay [time] [target] nmap --max-scan-delay 10s 192.168.1.1 nmap --min-rate [number] [target] nmap --min-rate 50 192.168.1.1 nmap --max-rate [number] [target] nmap --max-rate 100 192.168.1.1 nmap --defeat-rst-ratelimit [target] nmap --defeat-rst-ratelimit 192.168.1.1
nmap -sI 192.168.1.23 192.168.1.1 Manually Specify a Source Port nmap --source-port [port] [target] nmap --source-port 1025 192.168.1.1 nmap --data-length [size] [target] nmap --data-length 20 192.168.1.1 nmap --randomize-hosts [target] nmap --randomize-hosts 192.168.1.1-20 nmap --spoof-mac [MAC|0|vendor] [target] nmap --spoof-mac Cisco 192.168.1.1
nmap -oN output.txt 192.168.1.1 nmap -oX output.xml 192.168.1.1 nmap -oG output.txt 192.168.1.1 Output All Supported File Types nmap -oA [path/filename] [target] Periodically Display Statistics nmap --stats-every [time] [target] nmap --stats-every 10s 192.168.1.1 nmap -oS output.txt 192.168.1.1
nmap --packet-trace 192.168.1.1
nmap --script [script.nse] [target] nmap --script banner.nse 192.168.1.1 nmap --script [expression] [target] nmap --script 'http-*' 192.168.1.1 all, auth, default, discovery, external, intrusive, malware, safe, vuln nmap --script [category] [target] nmap --script 'not intrusive' 192.168.1.1 Execute Multiple Script Categories nmap --script [category1,category2,etc] nmap --script 'default or safe' 192.168.1.1 nmap --script [script] --script-trace [target] nmap --script banner.nse --script-trace 192.168.1.1
ndiff scan_output1.xml scan_output2.xml ndiff -v [scan1.xml] [scan2.xml] ndiff -v scan_output1.xml scan_output2.xml ndiff --xml [scan1.xml] [scan2.xml] ndiff --xml scan_output1.xml scan_output2.xml


View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

Hiç yorum yok:

Yorum Gönder