tldr/pages/common/naabu.md

34 lines
980 B
Markdown
Raw Normal View History

# naabu
> A fast port scanner written in Go with a focus on reliability and simplicity.
> Note: Some features are only activated when `naabu` is run with root privileges such as SYN scan.
> More information: <https://github.com/projectdiscovery/naabu>.
- Run a SYN scan against default (top 100) ports of remote host:
`sudo naabu -host {{host}}`
- Display available network interfaces and public IP address of the local host:
`naabu -interface-list`
- Scan all ports of the remote host (CONNECT scan without `sudo`):
`naabu -p - -host {{host}}`
- Scan the top 1000 ports of the remote host:
`naabu -top-ports 1000 -host {{host}}`
2024-02-08 21:49:30 +00:00
- Scan TCP ports 80, 443 and UDP port 53 of the remote host:
`naabu -p 80,443,u:53 -host {{host}}`
- Show CDN type the remote host is using, if any:
`naabu -p 80,443 -cdn -host {{host}}`
- Run `nmap` from `naabu` for additional functionalities (`nmap` must be installed):
`sudo naabu -v -host {{host}} -nmap-cli 'nmap {{-v -T5 -sC}}'`