Tag Archives: nmap
Common nmap commands during Pentest

1. Discover live hosts in a subnet nmap -n -sn -PE -oA live_hosts 192.168.1.0/24nmap -n -sn -PE -oA live_hosts 192.168.1.0/24…

Import Nmap results into Nessus

Download the Nmap XML Import plugin from http://tenablesecurity.com/documentation/nmapxml.nasl Copy the nmapxml.nasl file into the Nessus plugins directory C:\ProgramData\Tenable\Nessus\nessus\plugins Run a…

Enumerate DNS hostnames using nmap

nmap dns-brute script – Attempts to enumerate DNS hostnames by brute force guessing of common subdomains. With the dns-brute.srv argument,…

Network Stealth Scans

Nmap offers the following options, which we can use them to remain stealthy while we are scanning our network. The…

Enumerating services on your local network

If you are using windows open zenmap to execute the following command. If you are using linux or any *nix…

Banner grabbing with nmap

Open Zenmap or a terminal and execute the following line:   nmap -sS -sV -p 80 -v -n -Pn –script…

Discover open mysql ports

MySQL is running by default on port 3306. To discover MySQL you can do it either with nmap or with…

Ping with Nmap

Local Network   ARP Ping sudo nmap -PR -sn 192.168.1.0/24 -oN nmap_normal_outputsudo nmap -PR -sn 192.168.1.0/24 -oN nmap_normal_output -PR arp…

Idle Scanning with Nmap and Metasploit

Idle Scanning allows blind port scanning. We can scan a target without sending any packets to this target, from our…

Port Scanning with Nmap and Metasploit

Port Scanning Nmap is a free and open source tool for network discovery and security auditing. Nmap is able to…

Next Page