3.7 KiB
3.7 KiB
nmap
Scan Types
- ARP
- ICMP
- TCP
- UDP
Port States
- Open
- Closed
- Filtered
- Unfiltered
- Open|Filtered
- Close|Filtered
Usage
nmap -oA nmap-full -Pn -sS -T4 -p- --defeat-rst-ratelimit <IP>
nmap -oA nmap-vuln -Pn -script vuln -p <Port,Port,Port,...> <IP>
combo with searchsploit
- nmap-full scan
sudo nmap -oA --nmap-full -sS -sC -sV -p- --defeat-rst-ratelimit <target-IP>
searchsploit --nmap ./nmap-full.xml --verbose
Wordpress Enumeration
nmap --script http-wordpress-enum --scripts-args check-latest=true,search-limit=1500 -p 80 test.com
Use List of Hosts
nmap -iL <ListofHosts>
- Show hosts, dns resolution included
nmap -sL -n 10.10.0.0/16
ARP Scan Local Network
nmap -PR -sn 192.168.0.0/24
ICMP Scans
- Type 8 (Ping Request)
nmap -PE -sn 10.10.0.0/16
- Type 13 (Timestamp Request)
nmap -PP -sn 10.10.0.0/16
- Type 17 (Address Mask Queries)
nmap -PM -sn 10.10.0.0/16
TCP Scans
-PS23Syn on port 23-PA80-8080ACK on port range 80-8080
TCP Scan Types
- Null Scan
-sN, port is open when there is no response. Otherwise the response isRST/ACK - FIN Scan
-sF, same procedure as null scan. - Xmas Scan
-sX,FIN/PSH/URGis sent.RST/ACKwhen port is closed. - Maimon Scan
-sM, sendsFIN/ACK. Packet is dropped when port is open. Only viable on old BSD networks. - ACK Scan
-sA, sendsACK. ReceivesRSTregardless of the state of the port. May be used to explore firewall rules. - Window Scan
-sW, sendsACK, and receivesRSTas well. Inspects the window part of the response. Used to expose firewall rules. - Custom Scan
--scanflags RSTACKFIN, set flags randomly.
UDP SCans
-PU- May be answered by ICMP Type 3 if the port is not reachable
DNS Scan
- No lookup
-n - Reverse lookup for every host
-R - Host discovery only
-sn
Spoofing
- IP
-S <spoofed-IP> - MAC
--spoof-mac <spoofed-MAC> - Disable ping scan
-Pn - Decoy addresses
-D <decoy-IP>,<decoy-IP>,<decoy-IP>,RND,RND,ME
Service Detection
-sV--version-intensity <level 0-9>- Intensity 2
--version-light - Intensity 9
--version-all
Scripts
Installed at /usr/share/nmap/scripts
- auth Authentication related scripts
- broadcast Discover hosts by sending broadcast messages
- brute Performs brute-force password auditing against logins
- default Default scripts, same as -sC
- discovery Retrieve accessible information, such as database tables and DNS names
- dos Detects servers vulnerable to Denial of Service (DoS)
- exploit Attempts to exploit various vulnerable services
- external Checks using a third-party service, such as Geoplugin and Virustotal
- fuzzer Launch fuzzing attacks
- intrusive Intrusive scripts such as brute-force attacks and exploitation
- malware Scans for backdoors
- safe Safe scripts that won’t crash the target
- version Retrieve service versions
- vuln Checks for vulnerabilities or exploit vulnerable services
Tips & Tricks
- Scan the 100 most interesting ports via
-F --top-ports 100- One probe every 5 minutes via
-T0 - A closed port responds with
RST/ACKto a initialSYN - Scan ports iteratively by using
-r, not random - Closed Port
- Control packet rate via
--min-rateand--max-rate - Control parallel probes via
--min-parallelismand--max-parallelism - Fragment packets
-f8 bytes,-ff16 bytes or--mtu - Zombie Scan
-sI <pwnd-device-IP>via pwnd host inside the targets network --reason,-d,-vv--traceroute