NMap
External
Full Scan:
sudo nmap -sS -Pn -sV --open -iL targets.txt -p- -vv --min-hostgroup 255 --initial-rtt-timeout 150ms --max-rtt-timeout 300ms --max-scan-delay 0 -oA FULLUDP:
sudo nmap -Pn -sU -iL targets.txt -p 1-1024,5353,1900 -vvv | grep "/open" | awk '{ print $2 }' > UDP.txtLDAP:
sudo nmap --open -p 389 -iL targets.txt -oG - | grep "/open" | awk '{ print $2 }' > 389.txtHTTP:
sudo nmap --open -p 80 -iL targets.txt -oG - | grep "/open" | awk '{ print $2 }' > 80.txtHTTPS:
sudo nmap --open -p 443 -iL targets.txt -oG - | grep "/open" | awk '{ print $2 }' > 443.txtAlt HTTP:
sudo nmap --open -p 8080 -iL targets.txt -oG - | grep "/open" | awk '{ print $2 }' > 8080.txtAlt HTTPS:
sudo nmap --open -p 8443 -iL targets.txt -oG - | grep "/open" | awk '{ print $2 }' > 8443.txtFTP:
sudo nmap --open -p 21 -iL targets.txt -oG - | grep "/open" | awk '{ print $2 }' > 21.txtSSH:
RDP:
All in one:
Internal
Linux
Full Scan:
Online Hosts(ICMP):
LDAP:
HTTP:
Alt HTTP:
HTTPS:
Alt HTTPS:
FTP:
SMB
Determine Which hosts don't have signing
SSH:
SMB
RDP:
If RDP is open
UDP:
Scan for shares that allow anonymous login
All In one:
Windows
Find Uphosts:
Scan and output to file:
SMB Signing Not Required:
SNMP Info (default community name)
Puts saved output into just list of IPs:
Last updated