Scanning
Host Discovery
ARP
arp-scan
Active:
$ sudo arp-scan -l [-s <SPOOFED_IP>] -v
$ sudo arp-scan -I eth0 192.168.0.0/24netdiscover
Passive:
Active, sending 20 requests per IP:
Hunt for Subnets
Take 10.0.0.0/8 as an example:
Ping Sweep
Bash:
Batch:
PowerShell (option 1):
PowerShell (option 2):
Nmap:
RMI Sweep
Remote Management Interfaces:
22
SSH
3389
RDP
2222
SSH?
5900
VNC
5985
WinRM
5986
WinRM over SSL/TLS
Nmap:
Services
Raw Identification
Nmap XML Parsers
parsenmap.rb
Examine version scan:
Split version scan by service names:
nmaptocsv
Examine version scan:
Ports
Scan with echo:
Scan with nc:
Scan with PowerShell:
Top TCP ports:
21
FTP
22,2222
SSH
23
Telnet
25
SMTP
53
DNS
80,8080
HTTP
88
KDC
111
SUNRPC
135
MSRPC
137
NetBIOS
139,445
SMB over NetBIOS,SMB over TCP/IP
389,636
LDAP,LDAP over SSL/TLS
443,8443
SSL/TLS
593
HTTP RPC Endpoint Mapper
623
IPMI
873
RSYNC
1090,1098,1099,4444,11099,47001,47002,10999
Java RMI
1433
MS SQL
1521
Oracle
1947
HASP License Manager
2049
NFS
2375
Docker
3268,3269
Microsoft Global Catalog
3306
MySQL/MariaDB
3389
RDP
4786
Cisco Smart Install
4848
GlassFish
4899
Radmin Server
4990
Atlassian Crowd
5432
PostgreSQL
5555,5556
HP Data Protector
5900
VNC
5985,5986
WinRM,WinRM over SSL/TLS
6066
Apache Spark
6379
Redis
7000-7004,8000-8003,9000-9003,9503,7070,7071
WebLogic
8081,8082
JFrog Artifactory
8088
Apache Hadoop
8383
Zoho Manageengine Desktop
8500
Hashicorp Consul
8686,9012,50500
JMX
8880
IBM WebSphere
8888
Tornado
8983
Apache Solr
9000
Portainer
9100
TCP/IP Printing
9200
Elasticsearch
9389
Active Directory Web Services
11111,4444,4445
jBoss
27017
MongoDB
45000,45001
JDWP
TCP one-liner:
Top UDP ports:
53
DNS
67
DHCP
69
TFTP
88
KDC
123
NTP
137
NetBIOS
161
SNMP
500
IKE
623
IPMI
3391
RD Gateway
UDP one-liner:
Nmap
Flag -A:
Host discovery flag:
Search for Nmap NSE scripts:
Configure Nmap to run as unprivileged user by setting Linux capabilities:
Grep only numbers to get a comma-separated list of ports:
Define which NSE scripts were ran:
Look at HTTP titles:
Fast port discovery with Masscan + versions and scripts with Nmap (TCP):
Fast port discovery with Nmap + versions and scripts with Nmap (TCP & UDP):
Fast UDP:
Nmap a single host helper (full TCP), output is placed in CWD:
Visualizes a grepable Nmap output in terminal (run the scan with --open):
A tuned initial recon in a large range (stolen from here):
Masscan
RustScan
Scan Nmap top 1000 TCP ports:
Naabu
Invoke-Portscan
PowerShell_IPv4 Scanner
Hunt for Gateways & NICs
Search for gateways and dual-homed hosts.
gateway-finder-imp
tracebuster
cornershot
NetBIOS
nbtscan
nbname (MSF)
nextnet
RPC via IOXIDResolver
PingCastle
Double click > scanner > oxidbindings > all.
SharpOxidResolver
Tools
AutoRecon
legion
nmapAutomator
Install:
Run:
Last updated