Unterschiede
Hier werden die Unterschiede zwischen zwei Versionen angezeigt.
Nächste Überarbeitung | Vorhergehende Überarbeitung | ||
it-security:nmap [2022/12/20 22:49] – angelegt psycore | it-security:nmap [2024/08/16 11:15] (aktuell) – [gezielt Scannen] psycore | ||
---|---|---|---|
Zeile 1: | Zeile 1: | ||
+ | {{tag> | ||
+ | ====== Hilfreiche NMAP Scanner Kommandos ====== | ||
+ | Hier einige sehr nützliche Kommandos für NMAP. | ||
+ | |||
+ | ===== Command Set ===== | ||
+ | |||
+ | ==== Discover Hosts ==== | ||
+ | |||
+ | <code bash> | ||
+ | export IPRANGE=' | ||
+ | nmap -e tun0 -sn -v -oA pingscan $IPRANGE | ||
+ | </ | ||
+ | |||
+ | ==== Parse Results ==== | ||
+ | |||
+ | <code bash> | ||
+ | grep Up pingscan.gnmap | awk ' | ||
+ | </ | ||
+ | |||
+ | ==== Discover Services ==== | ||
+ | |||
+ | <code bash> | ||
+ | nmap -v -sSV -A -O -iL 172_16_ping_ips.txt | ||
+ | </ | ||
+ | |||
+ | ==== Discover more Hosts ==== | ||
+ | |||
+ | <code bash> | ||
+ | nmap -PE -PS80, | ||
+ | </ | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== Sonstige Kommandos ===== | ||
+ | |||
+ | ==== Ping Scan ==== | ||
+ | |||
+ | <code bash> | ||
+ | nmap -sP 172.16.0.0/ | ||
+ | </ | ||
+ | |||
+ | ==== schneller Scan ==== | ||
+ | |||
+ | <code bash> | ||
+ | nmap-sn 192.168.0.1/ | ||
+ | </ | ||
+ | |||
+ | ==== systematischer Scan ==== | ||
+ | |||
+ | <code bash> | ||
+ | nmap -e tun0 -PE -sn -n -oA pingscan 172.16.0.0/ | ||
+ | </ | ||
+ | |||
+ | <code bash> | ||
+ | grep Up pingscan.gnmap | awk ' | ||
+ | </ | ||
+ | |||
+ | <code bash> | ||
+ | nmap -e tun0 -sSV -O --top-ports 3800 -oA portscan172_ping_ips -iL 172_16_ping_ips.txt | ||
+ | </ | ||
+ | |||
+ | ==== gezielt Scannen ==== | ||
+ | |||
+ | <code bash> | ||
+ | nmap -v -A -O -oX / | ||
+ | </ | ||
+ | |||
+ | <code text> | ||
+ | -A: Enable OS detection, version detection, script scanning, and traceroute | ||
+ | -O: Enable OS detection | ||
+ | -oN/ | ||
+ | and Grepable format, respectively, | ||
+ | -iL < | ||
+ | </ | ||
+ | |||
+ | <code bash> | ||
+ | #Portrange | ||
+ | nmap -v -sSV -A -O -p40000-54000 $IP | ||
+ | </ | ||
+ | ==== Hostservices scannen ==== | ||
+ | |||
+ | <code bash> | ||
+ | |||
+ | ==== Schwachstellen scannen ==== | ||
+ | |||
+ | < | ||
+ | |||
+ | |||
+ | ==== NMAP Scans verschleiern ==== | ||
+ | |||
+ | <code bash> | ||
+ | --scan-delay/ | ||
+ | </ | ||
+ | |||
+ | ==== Banner Grabbing ==== | ||
+ | |||
+ | < |