Update nmap-cheatsheet.md

main
$./Netrunner_& 1 year ago committed by GitHub
parent f27e720537
commit f96c3866f3
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

@ -1,9 +1,11 @@
# NMAP Cheat Sheet Here is the Nmap cheat sheet converted to Markdown format:
# NMAP Cheat Sheet
## Table of Contents ## Table of Contents
1. [Ping Scanning](#ping-scanning) 1. [Ping Scanning](#ping-scanning)
2. [ARP Scanning](#arp-scanning) 2. [ARP Scanning](#arp-scanning)
3. [SYN Scanning](#syn-scanning) 3. [SYN Scanning](#syn-scanning)
4. [UDP Scanning](#udp-scanning) 4. [UDP Scanning](#udp-scanning)
5. [Useful Nmap Switches](#useful-nmap-switches) 5. [Useful Nmap Switches](#useful-nmap-switches)
@ -11,47 +13,37 @@
7. [Nmap Scripts](#nmap-scripts) 7. [Nmap Scripts](#nmap-scripts)
8. [Batch Script for Nmap](#batch-script-for-nmap) 8. [Batch Script for Nmap](#batch-script-for-nmap)
---
## Ping Scanning ## Ping Scanning
\`\`\`bash ```bash
nmap -sn 192.168.10.1 nmap -sn 192.168.10.1
nmap -sP 192.168.10.2 nmap -sP 192.168.10.2
\`\`\` ```
---
## ARP Scanning ## ARP Scanning
\`\`\`bash ```bash
nmap -sP -PR 192.168.10.1 nmap -sP -PR 192.168.10.1
\`\`\` ```
> **Note**: Press the spacebar to show the current progression of the scan. > **Note**: Press the spacebar to show the current progression of the scan.
---
## SYN Scanning ## SYN Scanning
\`\`\`bash ```bash
nmap -sS 192.168.10.1 nmap -sS 192.168.10.1
\`\`\` ```
---
## UDP Scanning ## UDP Scanning
\`\`\`bash ```bash
nmap -sU 192.168.10.1 nmap -sU 192.168.10.1
\`\`\` ```
---
## Useful Nmap Switches ## Useful Nmap Switches
- `-h` : Help - `-h` : Help
- `-v` : Verbose - `-v` : Verbose
- `-vv` : Very Verbose - `-vv` : Very Verbose
- `-n` : No DNS Reverse Lookup - `-n` : No DNS Reverse Lookup
- `-T` : Sets the speed of the scan (`-T5` being the fastest, `-T0` the slowest) - `-T` : Sets the speed of the scan (`-T5` being the fastest, `-T0` the slowest)
@ -59,9 +51,7 @@ nmap -sU 192.168.10.1
- `-p 80` : Specific port - `-p 80` : Specific port
- `-p 1-10` : Range of ports - `-p 1-10` : Range of ports
- `-p-` : All ports - `-p-` : All ports
- `-o` : To output a file - `-o` : To output a file
---
## Identifying OS and Applications ## Identifying OS and Applications
@ -70,53 +60,53 @@ nmap -sU 192.168.10.1
- `-A` : Enable OS Detection, Version Detection, Script Scanning, and Traceroute - `-A` : Enable OS Detection, Version Detection, Script Scanning, and Traceroute
- `--osscan-guess` : Aggressive OS guessing - `--osscan-guess` : Aggressive OS guessing
---
## Nmap Scripts ## Nmap Scripts
**Syntax**: `nmap —script scriptname targetIP` **Syntax**: `nmap —script scriptname targetIP`
Examples: Examples:
\`\`\`bash ```bash
nmap —script http-headers 192.168.10.1 nmap —script http-headers 192.168.10.1
nmap —script smtp-commands 192.168.10.1 nmap —script smtp-commands 192.168.10.1
nmap -sV --script=banner 192.168.10.1 nmap -sV --script=banner 192.168.10.1
nmap -sV --script=smb* 192.168.10.1 nmap -sV --script=smb* 192.168.10.1
nmap --script=http-title 192.168.10.1 nmap --script=http-title 192.168.10.1
nmap --script=http-enum 192.168.10.0/24 nmap --script=http-enum 192.168.10.0/24
\`\`\` ```
> [How to Use Nmap Script Engine (NSE) Scripts in Linux](https://www.tecmint.com/use-nmap-script-engine-nse-scripts-in-linux/) > [How to Use Nmap Script Engine (NSE) Scripts in Linux](https://www.tecmint.com/use-nmap-script-engine-nse-scripts-in-linux/)
---
## Batch Script for Nmap ## Batch Script for Nmap
1. First, download Neovim or your favorite text editor. 1. First, download Neovim or your favorite text editor.
2. Create a file named `nmapScan.sh`. 2. Create a file named `nmapScan.sh`.
\`\`\`bash ```bash
#!/bin/bash #!/bin/bash
nmap -sT -p 1-10000 -v -v -T5 -sV -O --osscan-guess --script=banner -oN 192.168.10.1TCP.txt 192.168.10.1
nmap -sU -p 1-500 -v -v --scan-delay 1s -sV --script=banner -oN 192.168.10.1UDP.txt 192.168.10.1
nmap -sT -p 1-10000 -v -v -T5 -sV -O --osscan-guess --script=banner -oN 192.168.10.2TCP.txt 192.168.10.2
nmap -sU -p 1-500 -v -v --scan-delay 1s -sV --script=banner -oN 192.168.10.2UDP.txt 192.168.10.2
```
nmap -sT -p 1-10000 -v -v -T5 -sV -O --osscan-guess --script=banner -oN 192.168.10.1TCP.txt 192.168.10.1 3. Save and exit.
nmap -sU -p 1-500 -v -v --scan-delay 1s -sV --script=banner -oN 192.168.10.1UDP.txt 192.168.10.1
nmap -sT -p 1-10000 -v -v -T5 -sV -O --osscan-guess --script=banner -oN 192.168.10.2TCP.txt 192.168.10.2
nmap -sU -p 1-500 -v -v --scan-delay 1s -sV --script=banner -oN 192.168.10.2UDP.txt 192.168.10.2
\`\`\`
3. Save and exit.
4. Make the script executable: 4. Make the script executable:
\`\`\`bash ```bash
sudo chmod +x nmapScan.sh sudo chmod +x nmapScan.sh
\`\`\` ```
5. Run the script: 5. Run the script:
\`\`\`bash ```bash
sudo ./nmapScan.sh sudo ./nmapScan.sh
\`\`\` ```
---
Let me know if you would like me to modify or add anything!

Loading…
Cancel
Save