Unterschiede
Hier werden die Unterschiede zwischen zwei Versionen angezeigt.
| Nächste Überarbeitung | Vorhergehende Überarbeitung | ||
| it-security:nmap [2022/12/20 21:49] – angelegt psycore | it-security:nmap [2024/08/16 09:15] (aktuell) – [gezielt Scannen] psycore | ||
|---|---|---|---|
| Zeile 1: | Zeile 1: | ||
| + | {{tag> | ||
| + | ====== Hilfreiche NMAP Scanner Kommandos ====== | ||
| + | Hier einige sehr nützliche Kommandos für NMAP. | ||
| + | |||
| + | ===== Command Set ===== | ||
| + | |||
| + | ==== Discover Hosts ==== | ||
| + | |||
| + | <code bash> | ||
| + | export IPRANGE=' | ||
| + | nmap -e tun0 -sn -v -oA pingscan $IPRANGE | ||
| + | </ | ||
| + | |||
| + | ==== Parse Results ==== | ||
| + | |||
| + | <code bash> | ||
| + | grep Up pingscan.gnmap | awk ' | ||
| + | </ | ||
| + | |||
| + | ==== Discover Services ==== | ||
| + | |||
| + | <code bash> | ||
| + | nmap -v -sSV -A -O -iL 172_16_ping_ips.txt | ||
| + | </ | ||
| + | |||
| + | ==== Discover more Hosts ==== | ||
| + | |||
| + | <code bash> | ||
| + | nmap -PE -PS80, | ||
| + | </ | ||
| + | |||
| + | ---- | ||
| + | |||
| + | ===== Sonstige Kommandos ===== | ||
| + | |||
| + | ==== Ping Scan ==== | ||
| + | |||
| + | <code bash> | ||
| + | nmap -sP 172.16.0.0/ | ||
| + | </ | ||
| + | |||
| + | ==== schneller Scan ==== | ||
| + | |||
| + | <code bash> | ||
| + | nmap-sn 192.168.0.1/ | ||
| + | </ | ||
| + | |||
| + | ==== systematischer Scan ==== | ||
| + | |||
| + | <code bash> | ||
| + | nmap -e tun0 -PE -sn -n -oA pingscan 172.16.0.0/ | ||
| + | </ | ||
| + | |||
| + | <code bash> | ||
| + | grep Up pingscan.gnmap | awk ' | ||
| + | </ | ||
| + | |||
| + | <code bash> | ||
| + | nmap -e tun0 -sSV -O --top-ports 3800 -oA portscan172_ping_ips -iL 172_16_ping_ips.txt | ||
| + | </ | ||
| + | |||
| + | ==== gezielt Scannen ==== | ||
| + | |||
| + | <code bash> | ||
| + | nmap -v -A -O -oX / | ||
| + | </ | ||
| + | |||
| + | <code text> | ||
| + | -A: Enable OS detection, version detection, script scanning, and traceroute | ||
| + | -O: Enable OS detection | ||
| + | -oN/ | ||
| + | and Grepable format, respectively, | ||
| + | -iL < | ||
| + | </ | ||
| + | |||
| + | <code bash> | ||
| + | #Portrange | ||
| + | nmap -v -sSV -A -O -p40000-54000 $IP | ||
| + | </ | ||
| + | ==== Hostservices scannen ==== | ||
| + | |||
| + | <code bash> | ||
| + | |||
| + | ==== Schwachstellen scannen ==== | ||
| + | |||
| + | < | ||
| + | |||
| + | |||
| + | ==== NMAP Scans verschleiern ==== | ||
| + | |||
| + | <code bash> | ||
| + | --scan-delay/ | ||
| + | </ | ||
| + | |||
| + | ==== Banner Grabbing ==== | ||
| + | |||
| + | < | ||