Advertisement
joemccray

nmap scans

Nov 24th, 2018
911
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.52 KB | None | 0 0
  1. ########################
  2. # Scanning Methodology #
  3. ########################
  4.  
  5. - Ping Sweep
  6. What's alive?
  7. ------------
  8.  
  9. ---------------------------Type This-----------------------------------
  10. sudo nmap -sP 157.166.226.*
  11. -----------------------------------------------------------------------
  12.  
  13.  
  14.  
  15. -if -SP yields no results try:
  16. ---------------------------Type This-----------------------------------
  17. sudo nmap -sL 157.166.226.*
  18. -----------------------------------------------------------------------
  19.  
  20.  
  21.  
  22. -Look for hostnames:
  23. ---------------------------Type This-----------------------------------
  24. sudo nmap -sL 157.166.226.* | grep com
  25. -----------------------------------------------------------------------
  26.  
  27.  
  28.  
  29. - Port Scan
  30. What's where?
  31. ------------
  32. ---------------------------Type This-----------------------------------
  33. sudo nmap -sS -p22,80,443,445,514,8080 162.243.126.247
  34. -----------------------------------------------------------------------
  35.  
  36.  
  37.  
  38. - Bannergrab/Version Query
  39. What versions of software are running
  40. -------------------------------------
  41.  
  42. ---------------------------Type This-----------------------------------
  43. sudo nmap -sV -p22,80,443,445,514,8080 162.243.126.247
  44. -----------------------------------------------------------------------
  45.  
  46.  
  47.  
  48.  
  49. - Vulnerability Research
  50. Lookup the banner versions for public exploits
  51. ----------------------------------------------
  52. http://exploit-db.com
  53. http://securityfocus.com/bid
  54. https://packetstormsecurity.com/files/tags/exploit/
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement