NMAP nmap -T4 -n -sS 192.168.0.1/24 # SYN # Study -sT (tcp), -sS (syn), -sA (ack), -sF (fin), -sN (null), -sX (xmas), -sI (idle), -sU (udp), -sV (service detection), -O (OS detection) # -sA: ACK - Filtered/Unfiltered - For detecting firewall, unfiltered (open/close) returns RST packet # -sF: FIN - Closed/Open|Filtered - RST when closed, no response when open|filtered # -sX: XMAS - FIN, PSH, URG - Same as FIN # -sN: NULL - Same as FIN # -sU: UDP - Open/Closed/Filtered/Open|Filtered - UDP response when open, ICMP type 3 code 3 (Port Unreachable) when closed, other ICMP when filtered, no response when open|filtered # -sI <host:port>: IDLE - Stealth scan using zombie host and IP fragmentation ID NETCAT nc -zv -w 1 google.com 21 # Scan google's port 21, -z scan, -v verbose, -w timeout nc -lvp 6969 # Opens a server on 6969, -l listens, -v verbose, -p port 6969 nc 192.168.1.54 6969 # Banner Grab with GET / HTTP/1.1 after connecting # CRYPTCAT, netcat alternative wit...
Comments
Post a Comment