Guideline
Scanning shit
nmap
To Run
sudo nmap <IP>/<subnet mask> -o network.nmap
sudo nmap -sV -sC -sT -T4 -A --top-ports=100 --open <IP> -Pn -o target.commonmap
sudo nmap -sV -sC -sT -T4 -A -p- --open <IP> -Pn -o target.fullmap
In case of slow scans
sudo nmap -p- --open <IP> -Pn -o target.fullmap
sudo nmap -sV -sC -sT -T4 -A -p<> --open <IP> -Pn -o target.<port>map
When not sure about service vulnerability (Look for EDB-ID tags)
sudo nmap -sV -p<> --script "vuln" <IP> -o target.vulnmapChecking Remote access viability (Require Credentials)
SSH
SMB
WINRM
RDP
Kerbrute (Checking valid usernames with DC)
Enumeration on inside
Linux
Windows
Pivoting
Last updated