DFIR Blog
  • Infosec
    • Blog
    • Threat Landscape
  • Digital Forensics
    • Windows Forensics
    • Mac Forensics
    • Memory Forensics
    • Forensic Resources
  • Incident Response
  • CISSP
    • Domain-1
    • Domain-2
    • Domain-3
    • Domain-4
    • Domain-5
    • Domain-6
    • Domain-7
    • Domain-8
  • Contact
  • HTB
  • Productivity

Network mapper (nmap)

1/9/2022

0 Comments

 
Nmap is an amazing tools used by Red and Blue teamer for offensive and defensive purposes.To run the Nmap command you'll need a target machine or a list of target machines. 


  • nmap -iL list_of_hosts.txt.


​
- Used at the recon stage.
- ​Most command command is nmap -sV -sC <target ip-address>
* this command is too noisy. 
  • nmap -Pn <target ip-address>
  • ​nmap -sV -sC -p 22,80 -T4 10.129.189.116

Script:
​
ports=$(nmap -p- --min-rate=1000 -Pn -T4 <IP ADDRESS> | grep '^[0-9]' | cut -d '/' -f 1| tr '\n' ',' | sed s/,$//)
nmap -p$ports-Pn-sC-sV <IP ADDRESS>
0 Comments



Leave a Reply.

    Author

    Write something about yourself. No need to be fancy, just an overview.

    Archives

    February 2022
    January 2022

    Categories

    All

    RSS Feed

  • Infosec
    • Blog
    • Threat Landscape
  • Digital Forensics
    • Windows Forensics
    • Mac Forensics
    • Memory Forensics
    • Forensic Resources
  • Incident Response
  • CISSP
    • Domain-1
    • Domain-2
    • Domain-3
    • Domain-4
    • Domain-5
    • Domain-6
    • Domain-7
    • Domain-8
  • Contact
  • HTB
  • Productivity