Update nmap-cheatsheet.md

main
$./Netrunner_& 11 months ago committed by GitHub
parent bd231121c7
commit 2d1dcf1422
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

@ -1,25 +1,26 @@
Here is the Nmap cheatsheet with some relevant emojis added:
# NMAP Cheat Sheet
# NMAP Cheat Sheet 🖥️
## Table of Contents
## Table of Contents 📋
1. [Ping Scanning](#ping-scanning)
2. [ARP Scanning](#arp-scanning)
3. [SYN Scanning](#syn-scanning)
4. [UDP Scanning](#udp-scanning)
5. [Useful Nmap Switches](#useful-nmap-switches)
6. [Identifying OS and Applications](#identifying-os-and-applications)
7. [Nmap Scripts](#nmap-scripts)
8. [Batch Script for Nmap](#batch-script-for-nmap)
1. [Ping Scanning](#ping-scanning) 📡
2. [ARP Scanning](#arp-scanning) 📶
3. [SYN Scanning](#syn-scanning) 👾
4. [UDP Scanning](#udp-scanning) 💾
5. [Useful Nmap Switches](#useful-nmap-switches) ⚙️
6. [Identifying OS and Applications](#identifying-os-and-applications) 🤖
7. [Nmap Scripts](#nmap-scripts) 📜
8. [Batch Script for Nmap](#batch-script-for-nmap) 💻
## Ping Scanning
## Ping Scanning 📡
```bash
nmap -sn 192.168.10.1
nmap -sP 192.168.10.2
```
## ARP Scanning
## ARP Scanning 📶
```bash
nmap -sP -PR 192.168.10.1
@ -27,19 +28,19 @@ nmap -sP -PR 192.168.10.1
> **Note**: Press the spacebar to show the current progression of the scan.
## SYN Scanning
## SYN Scanning 👾
```bash
nmap -sS 192.168.10.1
```
## UDP Scanning
## UDP Scanning 💾
```bash
nmap -sU 192.168.10.1
```
## Useful Nmap Switches
## Useful Nmap Switches ⚙️
- `-h` : Help
- `-v` : Verbose
@ -52,14 +53,14 @@ nmap -sU 192.168.10.1
- `-p-` : All ports
- `-o` : To output a file
## Identifying OS and Applications
## Identifying OS and Applications 🤖
- `-sV` : Enable Version Detection
- `-O` : Enable OS Detection
- `-A` : Enable OS Detection, Version Detection, Script Scanning, and Traceroute
- `--osscan-guess` : Aggressive OS guessing
## Nmap Scripts
## Nmap Scripts 📜
**Syntax**: `nmap —script scriptname targetIP`
@ -76,9 +77,9 @@ nmap --script=http-enum 192.168.10.0/24
> [How to Use Nmap Script Engine (NSE) Scripts in Linux](https://www.tecmint.com/use-nmap-script-engine-nse-scripts-in-linux/)
## Batch Script for Nmap
## Batch Script for Nmap 💻
1. First, download Neovim or your favorite text editor.
1. First, download Neovim or your favorite text editor. 📝
2. Create a file named `nmapScan.sh`.
@ -94,7 +95,7 @@ nmap --script=http-enum 192.168.10.0/24
nmap -sU -p 1-500 -v -v --scan-delay 1s -sV --script=banner -oN 192.168.10.2UDP.txt 192.168.10.2
```
3. Save and exit.
3. Save and exit. 💾
4. Make the script executable:
@ -107,3 +108,5 @@ nmap --script=http-enum 192.168.10.0/24
```bash
sudo ./nmapScan.sh
```
Let me know if you would like me to add or modify any emojis!

Loading…
Cancel
Save